last executing test programs: 4.653536479s ago: executing program 0 (id=9632): r0 = syz_open_dev$I2C(&(0x7f0000000380), 0x80000001, 0x82641) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000001400), 0x0, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x5450, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r2}, 0x10) r3 = openat$nullb(0xffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000040)) r4 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000340)="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", 0x1000, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r4) mq_getsetattr(0xffffffffffffffff, &(0x7f0000001500)={0x2, 0x2c38, 0x3, 0x1000}, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, r5, r4, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) close(r6) r7 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x81) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), r6) sendmsg$ETHTOOL_MSG_EEE_SET(r6, &(0x7f00000014c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001480)={&(0x7f0000001340)=ANY=[@ANYBLOB="80e00000", @ANYRES16=r8, @ANYBLOB="04002cbd7000fcdbdf251800000005000500000000003c00018008000300010000001400020077673200000000000000000000000000140002006e723000000000000000000000000000080003000300000008000700030000000800028004000100050006000100000005000600010000000500050001000000"], 0x80}, 0x1, 0x0, 0x0, 0x4015}, 0x20000050) r9 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_xfrm(r9, &(0x7f00000013c0)={&(0x7f0000001080), 0x10, &(0x7f0000001380)={0x0}}, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001600), 0x7b1182, 0x0) close_range(r12, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$cgroup_devices(r12, &(0x7f00000000c0)={'c', ' *:* ', 'm\x00'}, 0x8) getsockname(r11, &(0x7f0000001080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000100)=0x80) dup3(r10, r13, 0x0) getsockopt$inet_mtu(r13, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat(r7, &(0x7f0000000180)='./file0\x00', 0x40, 0x109) 4.397931023s ago: executing program 0 (id=9633): open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000006300)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x10408}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000021c0)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000081000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003dc150f4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50000000000000000000000000000000000000000000000000000000000000000000000000000000000c6d90000000000001354c4b6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a00", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000004200)="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", 0x2000, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x78, 0x0, 0x400000400, {0x0, 0x0, 0x0, {0x2, 0x10000000, 0x0, 0x6, 0x7ff, 0xfffffffffffffffd, 0x0, 0x3966, 0x3, 0x2000, 0x7ff, r2, r3, 0xc3d, 0x4}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x80101, 0x0) write$tcp_congestion(r4, 0x0, 0x0) r5 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r5, 0x10e, 0x2, &(0x7f0000000000)=0xa, 0x4) ioctl$EVIOCGID(r4, 0x80084502, 0x0) 3.117343508s ago: executing program 0 (id=9636): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000100), 0x307401, 0x0) close_range(r1, r1, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000280)={0x6, &(0x7f0000000240)=[{}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000440)={r3, 0x1}) write$P9_RLERRORu(r1, &(0x7f0000000040)=ANY=[], 0x1a) sendto(r1, 0x0, 0x0, 0x20044844, &(0x7f0000000180)=@in6={0xa, 0x0, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1}, 0x80) r4 = fcntl$dupfd(r0, 0x0, r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r4) sendmsg$NL80211_CMD_DEL_PMK(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x41}, 0xc080) r5 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r5, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0xc4, r2, 0x704, 0x70bd26, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4051}, 0x4) sendmsg$NL80211_CMD_SET_STATION(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0xfcbafdb6a16ad81) 2.986607995s ago: executing program 0 (id=9638): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, 0x0, 0x2, {0x0, 0x0, 0x3}}, 0x78) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) sendto$llc(r0, &(0x7f0000000200)="70930e98c3776978b749b32a96692debf8ef40f48ef214b9d83d59a9983d9d8c8b2fb882b2d2ae31897cd59b9f76f9c39d478495ca311ce92633851f2b27d0f7c28a4f885603615a86af7e8e2798d37392b02fe5a9664563314d58efd8a1b6d8cf067060f9cd4307632ff6fc0b8c233542533b2058692fc0f0be8a7a6cd64ab004b4fcdafcaa622094e465ad322bc36014c42dbd406e872a16697f4b671ec1197d1888a0f8390e6c137d6554a9430c4886333d0d50681b220afaf9be57022cc6f022aa3c58aea783e78cb42518e2f4154d5d60ff3553dc0cc63c50b7880238ab06b51c41c488dc31b7d2c4b700136a", 0xef, 0x40010, &(0x7f0000000300)={0x1a, 0x311, 0x6, 0x80, 0x10, 0x2, @link_local}, 0x10) r3 = dup2(r2, r1) accept$packet(r3, 0x0, &(0x7f0000000100)) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="10000000b11410f89f6434cbea9387e0"], 0x10}, 0x1, 0x0, 0x0, 0x6800}, 0x10) 1.73702078s ago: executing program 1 (id=9641): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40840, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0x5451, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x34, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x27}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0x43}}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008085}, 0x4000) 1.645537395s ago: executing program 1 (id=9642): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000000)=ANY=[@ANYBLOB="2d004000aec78a299a62b1503415ec62825ce3f7877ecfa375342960db2b0e5e0246e9631eb2520c1e7c347907e674062ce55b31ea38b721fd91853ed83432850a53044cc94ba5b2eac092bf0105e3fbf34ac655e0a1b682c62632dcd3b17265cdf085cb26ecbb98dab1387c53afdc", @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRES64=r0, @ANYRESOCT=r0], 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x40000) 1.55777335s ago: executing program 1 (id=9643): r0 = io_uring_setup(0x70c3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x4}) r1 = socket(0x2b, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x800, 0x0) socket(0x1d, 0x2, 0x6) 917.635013ms ago: executing program 1 (id=9644): r0 = add_key$user(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="f272c634", 0x4, 0xfffffffffffffffe) r1 = openat$vcsa(0xffffff9c, &(0x7f00000003c0), 0x80000, 0x0) openat$ptmx(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) openat$cgroup_ro(r1, &(0x7f0000000000)='memory.stat\x00', 0x275a, 0x0) write$P9_RREADLINK(r1, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r3, r2, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB(r4, 0x5451, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) recvmsg$unix(r7, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x20}, 0x0) keyctl$chown(0x4, r0, 0x0, r8) 797.841208ms ago: executing program 1 (id=9645): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x5452, &(0x7f0000000140)={0x1, 'team_slave_1\x00', {}, 0xffff}) r1 = openat$dsp1(0xffffff9c, &(0x7f0000000040), 0x10542, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff}) read$dsp(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$UHID_CREATE(r3, 0x0, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x5451, 0x0) 657.957126ms ago: executing program 1 (id=9646): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r2 = syz_usb_connect(0x0, 0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="120100005520f010402038b1420104000001090238000100000000090400000371055900090582eb1000000001020009050276"], 0x0) syz_usb_ep_write$ath9k_ep1(r2, 0x82, 0xc38, &(0x7f0000000080)=ANY=[]) 388.208749ms ago: executing program 0 (id=9647): fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) prlimit64(r0, 0x1, &(0x7f0000000040)={0x7ff, 0x80000000}, &(0x7f0000000080)) (async) prlimit64(r0, 0x1, &(0x7f0000000040)={0x7ff, 0x80000000}, &(0x7f0000000080)) r1 = openat$cuse(0xffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f0000000100)) (async) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f0000000100)) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x1) open$dir(&(0x7f00000001c0)='./file0\x00', 0x40, 0x10) (async) r2 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x40, 0x10) r3 = open_tree(r2, &(0x7f0000000200)='./file0\x00', 0x1000) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x1, 0x8, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0xb83ae88f616989af) (async) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x1, 0x8, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0xb83ae88f616989af) bind(r3, &(0x7f0000000340)=@isdn={0x22, 0x19, 0xff, 0x5, 0x4}, 0x80) (async) bind(r3, &(0x7f0000000340)=@isdn={0x22, 0x19, 0xff, 0x5, 0x4}, 0x80) lsetxattr$security_ima(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), &(0x7f0000000440)=@ng={0x4, 0x0, "da1fb47968"}, 0x7, 0x2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)=r3}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r4, 0x58, &(0x7f0000000540)}, 0x10) sendmsg$DEVLINK_CMD_TRAP_GET(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)={0x1b4, 0x0, 0x10, 0x70bd2d, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x4010}, 0x4004815) getsockname$packet(r3, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000008c0)=0x14) (async) getsockname$packet(r3, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000008c0)=0x14) lsetxattr$trusted_overlay_redirect(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940), &(0x7f0000000980)='./file1\x00', 0x8, 0x2) (async) lsetxattr$trusted_overlay_redirect(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940), &(0x7f0000000980)='./file1\x00', 0x8, 0x2) accept(r3, &(0x7f00000009c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000a40)=0x80) (async) accept(r3, &(0x7f00000009c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000a40)=0x80) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000a80)={r6, r3}) r7 = open_tree(r3, &(0x7f0000000ac0)='./file0\x00', 0x80001) r8 = syz_io_uring_complete(0x0) shutdown(r8, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={r3, 0x20, &(0x7f0000000f40)={&(0x7f0000000d80)=""/182, 0xb6, 0x0, &(0x7f0000000e40)=""/242, 0xf2}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={r3, 0x20, &(0x7f0000000f40)={&(0x7f0000000d80)=""/182, 0xb6, 0x0, &(0x7f0000000e40)=""/242, 0xf2}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000fc0)={r7, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0xd, 0x15, &(0x7f0000000b00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x800}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x5528}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000bc0)='GPL\x00', 0x3, 0xf1, &(0x7f0000000c00)=""/241, 0x41000, 0x0, '\x00', r5, @fallback=0x27, r8, 0x8, &(0x7f0000000d00)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000d40)={0x2, 0x4, 0x1, 0x5}, 0x10, r9, r3, 0x0, &(0x7f0000001000)=[r10, r8, r3, 0xffffffffffffffff, r7, r8], 0x0, 0x10, 0x6}, 0x94) mount(&(0x7f0000001100)=@md0, &(0x7f0000001140)='./file0\x00', &(0x7f0000001180)='reiserfs\x00', 0x10, &(0x7f00000011c0)='\'-\':+#$\x00') socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8982, &(0x7f0000001200)={0x2, 'veth1_virt_wifi\x00', {0x40}, 0x8000}) sendmsg$NFT_MSG_GETOBJ_RESET(r7, &(0x7f0000001300)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000012c0)={&(0x7f0000001280)={0x38, 0x15, 0xa, 0xf00, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4040}, 0x20004400) ioctl$TIOCSERGETLSR(r8, 0x5459, &(0x7f0000001340)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) (async) ioctl$UI_DEV_CREATE(r3, 0x5501) 0s ago: executing program 0 (id=9648): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000f80)=0x481, 0x4) r1 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) read$FUSE(r1, &(0x7f0000000fc0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f00000002c0)={0x10, 0x0, r3}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x700, 0x1, 0x24762b42, 0x6, {{0x12, 0x4, 0x0, 0x4, 0x48, 0x64, 0x0, 0x2, 0x4, 0x0, @empty, @empty, {[@cipso={0x86, 0x2e, 0x2, [{0x5, 0xd, "3218c14662c1f58fb6f500"}, {0x1, 0xf, "d987add78f2237bd272f991752"}, {0x6, 0xc, "9bf4d890a001553bf0ef"}]}, @ra={0x94, 0x4}]}}}}}) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x25182018}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x84, r2, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@GTPA_TID={0xc, 0x3, 0x2}, @GTPA_MS_ADDR6={0x14, 0xc, @private1={0xfc, 0x1, '\x00', 0x1}}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_FAMILY={0x5, 0xd, 0x2}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_LINK={0x8, 0x1, r4}, @GTPA_MS_ADDR6={0x14, 0xc, @mcast1}, @GTPA_MS_ADDR6={0x14, 0xc, @empty}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x4) kernel console output (not intermixed with test programs): r8:85818c00 r7:00000d40 r6:86151c28 r5:00000022 r4:83001240 [ 6587.904049][T13357] [<8051f6dc>] (should_failslab) from [<80504128>] (__kmalloc_noprof+0x9c/0x458) [ 6587.904073][T13357] [<8050408c>] (__kmalloc_noprof) from [<807c3544>] (tomoyo_encode2+0x64/0xf0) [ 6587.904104][T13357] r10:00000fff r9:8309e400 r8:00000000 r7:834d2ee0 r6:86151c28 r5:8563cffc [ 6587.904113][T13357] r4:8563cfe5 [ 6587.904121][T13357] [<807c34e0>] (tomoyo_encode2) from [<807c35f4>] (tomoyo_encode+0x24/0x30) [ 6587.904149][T13357] r9:8309e400 r8:00000000 r7:834d2ee0 r6:86151c28 r5:00001000 r4:8563cfe6 [ 6587.904156][T13357] [<807c35d0>] (tomoyo_encode) from [<807c3680>] (tomoyo_realpath_from_path+0x80/0x17c) [ 6587.904180][T13357] r5:00001000 r4:8563c000 [ 6587.904187][T13357] [<807c3600>] (tomoyo_realpath_from_path) from [<807bf780>] (tomoyo_path_number_perm+0xcc/0x22c) [ 6587.904215][T13357] r10:85818c00 r9:00000000 r8:86151c00 r7:41015500 r6:00000004 r5:81cd6504 [ 6587.904225][T13357] r4:86151c28 r3:826c0200 [ 6587.904232][T13357] [<807bf6b4>] (tomoyo_path_number_perm) from [<807c4060>] (tomoyo_file_ioctl+0x1c/0x20) [ 6587.904262][T13357] r9:00000004 r8:86151c00 r7:76ba9e60 r6:76ba9e60 r5:41015500 r4:86151c00 [ 6587.904270][T13357] [<807c4044>] (tomoyo_file_ioctl) from [<807708b4>] (security_file_ioctl+0x64/0x1e4) [ 6587.904295][T13357] [<80770850>] (security_file_ioctl) from [<8056d038>] (sys_ioctl+0x4c/0xba0) [ 6587.904324][T13357] r7:76ba9e60 r6:86151c01 r5:76ba9e70 r4:41015500 [ 6587.904332][T13357] [<8056cfec>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6587.904352][T13357] Exception stack(0xdfbc5fa8 to 0xdfbc5ff0) [ 6587.904371][T13357] 5fa0: 00000004 76ba9e70 00000004 41015500 76ba9e60 76ba8e00 [ 6587.904387][T13357] 5fc0: 00000004 76ba9e70 76ba8e70 00000036 00000002 76ba9e60 00000000 00000000 [ 6587.904424][T13357] 5fe0: 00000000 76ba8de8 002b9000 00131bbc [ 6587.904444][T13357] r10:00000036 r9:85818c00 r8:8020029c r7:00000036 r6:76ba8e70 r5:76ba9e70 [ 6587.904452][T13357] r4:00000004 [ 6587.917363][T13357] ERROR: Out of memory at tomoyo_realpath_from_path. [ 6588.153898][T10819] usb 1-1: new full-speed USB device number 101 using dummy_hcd [ 6588.358739][T10819] usb 1-1: config 0 has no interfaces? [ 6588.365195][T10819] usb 1-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 6588.366324][T10819] usb 1-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 6588.367215][T10819] usb 1-1: Product: syz [ 6588.367859][T10819] usb 1-1: Manufacturer: syz [ 6588.371765][T10819] usb 1-1: config 0 descriptor?? [ 6588.601769][T22670] usb 1-1: USB disconnect, device number 101 [ 6589.114141][T10819] usb 1-1: new high-speed USB device number 102 using dummy_hcd [ 6589.309939][T10819] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 6589.310307][T10819] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 6589.310502][T10819] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 6589.310659][T10819] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 6589.310878][T10819] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 6589.311035][T10819] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6589.319113][T10819] usb 1-1: config 0 descriptor?? [ 6589.833902][T10819] plantronics 0003:047F:FFFF.007D: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 6593.471929][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 6593.472192][ T31] audit: type=1400 audit(6593.420:174903): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6593.481205][ T31] audit: type=1400 audit(6593.430:174904): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6593.497131][ T31] audit: type=1400 audit(6593.450:174905): avc: denied { read write } for pid=9478 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6593.497535][ T31] audit: type=1400 audit(6593.450:174906): avc: denied { open } for pid=9478 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6593.497840][ T31] audit: type=1400 audit(6593.450:174907): avc: denied { ioctl } for pid=9478 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6593.520232][ T31] audit: type=1400 audit(6593.470:174908): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6593.520642][ T31] audit: type=1400 audit(6593.470:174909): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6593.520901][ T31] audit: type=1400 audit(6593.470:174910): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6593.529934][ T31] audit: type=1400 audit(6593.480:174911): avc: denied { recv } for pid=2840 comm="pr/ttyAMA0" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6593.536136][ T31] audit: type=1400 audit(6593.490:174912): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6593.666728][T13389] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6593.667811][T13389] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6598.562785][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 6598.563689][ T31] audit: type=1400 audit(6598.510:174979): avc: denied { read write } for pid=13401 comm="syz.1.9414" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6598.567312][ T31] audit: type=1400 audit(6598.520:174980): avc: denied { open } for pid=13401 comm="syz.1.9414" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6598.760343][ T31] audit: type=1400 audit(6598.690:174981): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6598.760823][ T31] audit: type=1400 audit(6598.710:174982): avc: denied { recv } for pid=11770 comm="syz.0.8987" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6598.785624][ T31] audit: type=1400 audit(6598.740:174983): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6598.786306][ T31] audit: type=1400 audit(6598.740:174984): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6598.787833][ T31] audit: type=1400 audit(6598.740:174985): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6598.795350][ T31] audit: type=1400 audit(6598.750:174986): avc: denied { recv } for pid=2840 comm="pr/ttyAMA0" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6598.810253][ T31] audit: type=1400 audit(6598.760:174987): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6598.810697][ T31] audit: type=1400 audit(6598.760:174988): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6603.658898][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 6603.659374][ T31] audit: type=1400 audit(6603.610:175056): avc: denied { create } for pid=13414 comm="syz.1.9419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6603.662524][ T31] audit: type=1400 audit(6603.610:175057): avc: denied { write } for pid=13414 comm="syz.1.9419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6603.666133][ T31] audit: type=1400 audit(6603.620:175058): avc: denied { read } for pid=13414 comm="syz.1.9419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6603.693793][ T31] audit: type=1400 audit(6603.640:175059): avc: denied { module_request } for pid=13414 comm="syz.1.9419" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6603.722577][T22670] usb 1-1: USB disconnect, device number 102 [ 6603.741454][ T31] audit: type=1400 audit(6603.680:175060): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6603.744555][ T31] audit: type=1400 audit(6603.680:175061): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6603.746307][ T31] audit: type=1400 audit(6603.690:175062): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6603.748253][ T31] audit: type=1400 audit(6603.690:175063): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6603.750048][ T31] audit: type=1400 audit(6603.690:175064): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6603.756154][ T31] audit: type=1400 audit(6603.710:175065): avc: denied { recv } for pid=2840 comm="pr/ttyAMA0" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6608.179908][T13449] fuse: Unknown parameter 'U…(gGp0x0000000000000004' [ 6608.685735][ T31] kauditd_printk_skb: 150 callbacks suppressed [ 6608.685905][ T31] audit: type=1400 audit(6608.640:175216): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6608.686035][ T31] audit: type=1400 audit(6608.640:175217): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6608.686138][ T31] audit: type=1400 audit(6608.640:175218): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6608.692472][ T31] audit: type=1400 audit(6608.640:175219): avc: denied { recv } for pid=2840 comm="pr/ttyAMA0" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6608.696778][ T31] audit: type=1400 audit(6608.650:175220): avc: denied { recv } for pid=12918 comm="syz.1.9293" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6608.701632][ T31] audit: type=1400 audit(6608.650:175221): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6608.704072][ T31] audit: type=1400 audit(6608.650:175222): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6608.719292][ T31] audit: type=1400 audit(6608.670:175223): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6608.720787][ T31] audit: type=1400 audit(6608.670:175224): avc: denied { open } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6608.723433][ T31] audit: type=1400 audit(6608.670:175225): avc: denied { ioctl } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6612.200758][T13475] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=152 sclass=netlink_route_socket pid=13475 comm=syz.1.9435 [ 6613.707695][ T31] kauditd_printk_skb: 157 callbacks suppressed [ 6613.708126][ T31] audit: type=1400 audit(6613.660:175381): avc: denied { create } for pid=13483 comm="syz.1.9438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6613.725982][ T31] audit: type=1400 audit(6613.680:175382): avc: denied { ioctl } for pid=13483 comm="syz.1.9438" path="socket:[108218]" dev="sockfs" ino=108218 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6613.758332][ T31] audit: type=1400 audit(6613.710:175383): avc: denied { bind } for pid=13483 comm="syz.1.9438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6613.907065][ T31] audit: type=1400 audit(6613.860:175384): avc: denied { create } for pid=13485 comm="syz.0.9439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6613.937375][ T31] audit: type=1400 audit(6613.890:175385): avc: denied { setattr } for pid=13485 comm="syz.0.9439" name="RAWv6" dev="sockfs" ino=108220 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6613.971568][ T31] audit: type=1400 audit(6613.920:175386): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6613.980119][ T31] audit: type=1400 audit(6613.930:175387): avc: denied { recv } for pid=10880 comm="syz.0.8715" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6614.018371][ T31] audit: type=1400 audit(6613.970:175388): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6614.020553][ T31] audit: type=1400 audit(6613.970:175389): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6614.020849][ T31] audit: type=1400 audit(6613.970:175390): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6619.036737][ T31] kauditd_printk_skb: 105 callbacks suppressed [ 6619.037129][ T31] audit: type=1400 audit(6618.990:175496): avc: denied { create } for pid=13505 comm="syz.0.9446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6619.066983][ T31] audit: type=1400 audit(6619.020:175497): avc: denied { setopt } for pid=13505 comm="syz.0.9446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6619.141290][ T31] audit: type=1400 audit(6619.090:175498): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6619.145177][ T31] audit: type=1400 audit(6619.090:175499): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6619.148839][ T31] audit: type=1400 audit(6619.100:175500): avc: denied { recv } for pid=2840 comm="pr/ttyAMA0" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6619.155816][ T31] audit: type=1400 audit(6619.110:175501): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6619.156151][ T31] audit: type=1400 audit(6619.110:175502): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6619.176593][ T31] audit: type=1400 audit(6619.130:175503): avc: denied { recv } for pid=11918 comm="syz.1.9041" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6619.190357][ T31] audit: type=1400 audit(6619.140:175504): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6619.192605][ T31] audit: type=1400 audit(6619.140:175505): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6623.064089][T20940] usb 1-1: new high-speed USB device number 103 using dummy_hcd [ 6623.223839][T20940] usb 1-1: device descriptor read/64, error -71 [ 6623.473894][T20940] usb 1-1: new high-speed USB device number 104 using dummy_hcd [ 6623.693727][T20940] usb 1-1: device descriptor read/64, error -71 [ 6623.805189][T20940] usb usb1-port1: attempt power cycle [ 6624.173815][T20940] usb 1-1: new high-speed USB device number 105 using dummy_hcd [ 6624.206390][T20940] usb 1-1: device descriptor read/8, error -71 [ 6624.474341][T20940] usb 1-1: new high-speed USB device number 106 using dummy_hcd [ 6624.512115][T20940] usb 1-1: device descriptor read/8, error -71 [ 6624.624489][T20940] usb usb1-port1: unable to enumerate USB device [ 6625.383713][ T31] kauditd_printk_skb: 115 callbacks suppressed [ 6625.384027][ T31] audit: type=1400 audit(6625.330:175621): avc: denied { recv } for pid=12918 comm="syz.1.9293" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6625.899537][ T31] audit: type=1400 audit(6625.850:175622): avc: denied { write } for pid=13528 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6625.934084][ T31] audit: type=1400 audit(6625.860:175623): avc: denied { open } for pid=13528 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6626.129016][ T31] audit: type=1400 audit(6626.080:175624): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6626.133691][ T31] audit: type=1400 audit(6626.080:175625): avc: denied { recv } for pid=12918 comm="syz.1.9293" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6626.139722][ T31] audit: type=1400 audit(6626.090:175626): avc: denied { search } for pid=13528 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6626.163274][ T31] audit: type=1400 audit(6626.110:175627): avc: denied { search } for pid=13528 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6626.164518][ T31] audit: type=1400 audit(6626.110:175628): avc: denied { search } for pid=13528 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6626.164664][ T31] audit: type=1400 audit(6626.110:175629): avc: denied { search } for pid=13528 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6626.175466][ T31] audit: type=1400 audit(6626.130:175630): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6632.594460][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 6632.594686][ T31] audit: type=1400 audit(6632.550:175698): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6632.606304][ T31] audit: type=1400 audit(6632.550:175699): avc: denied { recv } for pid=8970 comm="syz-executor" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6632.634131][ T31] audit: type=1400 audit(6632.570:175700): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6632.634576][ T31] audit: type=1400 audit(6632.570:175701): avc: denied { open } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6632.634786][ T31] audit: type=1400 audit(6632.570:175702): avc: denied { ioctl } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6632.653595][ T31] audit: type=1400 audit(6632.600:175703): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6632.661795][ T31] audit: type=1400 audit(6632.600:175704): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6632.664648][ T31] audit: type=1400 audit(6632.600:175705): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6632.666601][ T31] audit: type=1400 audit(6632.600:175706): avc: denied { recv } for pid=11918 comm="syz.1.9041" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6632.673653][ T31] audit: type=1400 audit(6632.610:175707): avc: denied { recv } for pid=11918 comm="syz.1.9041" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6633.406801][T13539] FAULT_INJECTION: forcing a failure. [ 6633.406801][T13539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6633.413865][T13539] CPU: 1 UID: 0 PID: 13539 Comm: syz.0.9455 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 6633.414059][T13539] Hardware name: ARM-Versatile Express [ 6633.414089][T13539] Call trace: [ 6633.414153][T13539] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6633.414349][T13539] r7:b5403587 r6:00000000 r5:60000113 r4:82260dd4 [ 6633.414376][T13539] [<80201b08>] (show_stack) from [<8021fb98>] (dump_stack_lvl+0x70/0x7c) [ 6633.414431][T13539] [<8021fb28>] (dump_stack_lvl) from [<8021fbbc>] (dump_stack+0x18/0x1c) [ 6633.414482][T13539] r5:85818000 r4:8294f150 [ 6633.414498][T13539] [<8021fba4>] (dump_stack) from [<80972360>] (should_fail_ex+0x1c4/0x228) [ 6633.414551][T13539] [<8097219c>] (should_fail_ex) from [<809723d8>] (should_fail+0x14/0x18) [ 6633.414608][T13539] r8:00000000 r7:b5403587 r6:00000000 r5:85818830 r4:76baabb8 [ 6633.414626][T13539] [<809723c4>] (should_fail) from [<809723f8>] (should_fail_usercopy+0x1c/0x20) [ 6633.414676][T13539] [<809723dc>] (should_fail_usercopy) from [<8022b664>] (setup_sigframe+0x124/0x1c4) [ 6633.414728][T13539] [<8022b540>] (setup_sigframe) from [<8022bacc>] (do_work_pending+0x2f4/0x4f8) [ 6633.414787][T13539] r10:00000077 r9:b5403587 r8:00000000 r7:85818830 r6:76baabb8 r5:dfcf9fb0 [ 6633.414806][T13539] r4:85818000 [ 6633.414820][T13539] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 6633.414861][T13539] Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) [ 6633.414894][T13539] 9fa0: fffffffc 20000200 04000000 00000000 [ 6633.414940][T13539] 9fc0: 00000000 00000000 001301a0 00000128 002e0000 00000000 00006364 76bab0bc [ 6633.414970][T13539] 9fe0: 76baaec0 76baaeb0 000193dc 001321f0 60000010 00000011 [ 6633.415003][T13539] r10:00000077 r9:85818000 r8:00000000 r7:00000077 r6:001301a0 r5:00000000 [ 6633.415020][T13539] r4:00000000 [ 6635.726491][T13548] 8021q: VLANs not supported on vcan0 [ 6637.644296][ T31] kauditd_printk_skb: 123 callbacks suppressed [ 6637.644566][ T31] audit: type=1400 audit(6637.520:175831): avc: denied { write } for pid=13558 comm="syz.0.9463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6637.644828][ T31] audit: type=1400 audit(6637.520:175832): avc: denied { ioctl } for pid=13558 comm="syz.0.9463" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x540f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6637.645082][ T31] audit: type=1400 audit(6637.580:175833): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6637.645297][ T31] audit: type=1400 audit(6637.590:175834): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6637.645497][ T31] audit: type=1400 audit(6637.590:175835): avc: denied { read write open } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6637.652636][ T31] audit: type=1400 audit(6637.600:175837): avc: denied { recv } for pid=10880 comm="syz.0.8715" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6637.662118][ T31] audit: type=1400 audit(6637.590:175836): avc: denied { ioctl } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6637.685900][ T31] audit: type=1400 audit(6637.640:175838): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6637.687098][ T31] audit: type=1400 audit(6637.640:175839): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6637.688326][ T31] audit: type=1400 audit(6637.640:175840): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6642.679348][ T31] kauditd_printk_skb: 84 callbacks suppressed [ 6642.679522][ T31] audit: type=1400 audit(6642.630:175925): avc: denied { read write } for pid=13574 comm="syz.1.9468" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6642.679834][ T31] audit: type=1400 audit(6642.630:175926): avc: denied { open } for pid=13574 comm="syz.1.9468" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6642.706435][ T31] audit: type=1400 audit(6642.660:175927): avc: denied { allowed } for pid=13574 comm="syz.1.9468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6642.710153][ T31] audit: type=1400 audit(6642.660:175928): avc: denied { create } for pid=13574 comm="syz.1.9468" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6642.711777][ T31] audit: type=1400 audit(6642.660:175929): avc: denied { map } for pid=13574 comm="syz.1.9468" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=108835 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6642.712072][ T31] audit: type=1400 audit(6642.660:175930): avc: denied { read write } for pid=13574 comm="syz.1.9468" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=108835 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6642.737339][ T31] audit: type=1400 audit(6642.690:175931): avc: denied { write } for pid=13574 comm="syz.1.9468" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6642.737601][ T31] audit: type=1400 audit(6642.690:175932): avc: denied { open } for pid=13574 comm="syz.1.9468" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6643.270818][ T31] audit: type=1400 audit(6643.220:175933): avc: denied { ioctl } for pid=13574 comm="syz.1.9468" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6644.471001][ T31] audit: type=1400 audit(6644.420:175934): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6644.927728][T13584] FAULT_INJECTION: forcing a failure. [ 6644.927728][T13584] name failslab, interval 1, probability 0, space 0, times 0 [ 6644.927967][T13584] CPU: 0 UID: 0 PID: 13584 Comm: syz.0.9471 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 6644.928016][T13584] Hardware name: ARM-Versatile Express [ 6644.928031][T13584] Call trace: [ 6644.928052][T13584] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6644.928107][T13584] r7:8581ec00 r6:00000000 r5:60000013 r4:82260dd4 [ 6644.928116][T13584] [<80201b08>] (show_stack) from [<8021fb98>] (dump_stack_lvl+0x70/0x7c) [ 6644.928144][T13584] [<8021fb28>] (dump_stack_lvl) from [<8021fbbc>] (dump_stack+0x18/0x1c) [ 6644.928171][T13584] r5:8581ec00 r4:82917bc0 [ 6644.928178][T13584] [<8021fba4>] (dump_stack) from [<80972360>] (should_fail_ex+0x1c4/0x228) [ 6644.928215][T13584] [<8097219c>] (should_fail_ex) from [<8051f748>] (should_failslab+0x6c/0x94) [ 6644.928286][T13584] r8:00000000 r7:8581ec00 r6:00000dc0 r5:00000080 r4:83001180 [ 6644.928302][T13584] [<8051f6dc>] (should_failslab) from [<80502e14>] (__kmalloc_cache_node_noprof+0x50/0x348) [ 6644.928342][T13584] [<80502dc4>] (__kmalloc_cache_node_noprof) from [<8084bcfc>] (blk_mq_init_tags+0x48/0xf0) [ 6644.928393][T13584] r10:860704bc r9:00000080 r8:00000000 r7:00000000 r6:00000000 r5:00000080 [ 6644.928452][T13584] r4:00000000 [ 6644.928470][T13584] [<8084bcb4>] (blk_mq_init_tags) from [<80848ef4>] (blk_mq_alloc_map_and_rqs+0x44/0x308) [ 6644.932507][T13584] r9:00000003 r8:00000080 r7:00000080 r6:8559bc80 r5:00000000 r4:00000000 [ 6644.932751][T13584] [<80848eb0>] (blk_mq_alloc_map_and_rqs) from [<8084989c>] (blk_mq_alloc_tag_set+0x1d4/0x3e0) [ 6644.933100][T13584] r10:8581ec00 r9:00000003 r8:00000080 r7:00000000 r6:8559bc80 r5:00000000 [ 6644.933329][T13584] r4:860704bc [ 6644.933349][T13584] [<808496c8>] (blk_mq_alloc_tag_set) from [<80b77dec>] (loop_add+0x128/0x32c) [ 6644.933451][T13584] r9:00000003 r8:860704bc r7:00000000 r6:8295e17c r5:00000000 r4:86070400 [ 6644.933474][T13584] [<80b77cc4>] (loop_add) from [<80b79a18>] (loop_control_ioctl+0x11c/0x234) [ 6644.933560][T13584] r10:8581ec00 r9:00000003 r8:86151c00 r7:00000000 r6:86151c00 r5:00000000 [ 6644.933580][T13584] r4:00004c80 [ 6644.933595][T13584] [<80b798fc>] (loop_control_ioctl) from [<8056d11c>] (sys_ioctl+0x130/0xba0) [ 6644.933649][T13584] r6:86151c00 r5:00000000 r4:00004c80 [ 6644.933666][T13584] [<8056cfec>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6644.933712][T13584] Exception stack(0xdf9cdfa8 to 0xdf9cdff0) [ 6644.933751][T13584] dfa0: 00000000 00000000 00000003 00004c80 00000000 00000000 [ 6644.933785][T13584] dfc0: 00000000 00000000 001301a0 00000036 002e0000 00000000 00006364 76bab0bc [ 6644.933875][T13584] dfe0: 76baaec0 76baaeb0 000193dc 001321f0 [ 6644.933911][T13584] r10:00000036 r9:8581ec00 r8:8020029c r7:00000036 r6:001301a0 r5:00000000 [ 6644.933929][T13584] r4:00000000 [ 6644.955977][T13584] blk-mq: reduced tag depth (128 -> 64) [ 6646.753712][T22670] usb 2-1: new high-speed USB device number 116 using dummy_hcd [ 6646.923610][T22670] usb 2-1: Using ep0 maxpacket: 16 [ 6646.929756][T22670] usb 2-1: config 252 has an invalid interface number: 15 but max is 0 [ 6646.930395][T22670] usb 2-1: config 252 has no interface number 0 [ 6646.954904][T22670] usb 2-1: New USB device found, idVendor=13b1, idProduct=0042, bcdDevice=2b.29 [ 6646.956061][T22670] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6646.957187][T22670] usb 2-1: Product: syz [ 6646.957571][T22670] usb 2-1: Manufacturer: syz [ 6646.957952][T22670] usb 2-1: SerialNumber: syz [ 6647.304458][T22670] usb 2-1: USB disconnect, device number 116 [ 6647.765373][ T31] kauditd_printk_skb: 200 callbacks suppressed [ 6647.766465][ T31] audit: type=1400 audit(6647.700:176133): avc: denied { create } for pid=13632 comm="syz.0.9479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6647.772475][ T31] audit: type=1400 audit(6647.700:176134): avc: denied { write } for pid=13632 comm="syz.0.9479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6647.778737][ T31] audit: type=1400 audit(6647.730:176135): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6647.791086][ T31] audit: type=1400 audit(6647.740:176136): avc: denied { recv } for pid=11770 comm="syz.0.8987" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6647.808514][ T31] audit: type=1400 audit(6647.760:176137): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6647.811507][ T31] audit: type=1400 audit(6647.760:176138): avc: denied { open } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6647.815815][ T31] audit: type=1400 audit(6647.760:176139): avc: denied { ioctl } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6647.831949][ T31] audit: type=1400 audit(6647.780:176140): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6647.832542][ T31] audit: type=1400 audit(6647.780:176141): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6647.832758][ T31] audit: type=1400 audit(6647.780:176142): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6648.400911][T13640] FAULT_INJECTION: forcing a failure. [ 6648.400911][T13640] name failslab, interval 1, probability 0, space 0, times 0 [ 6648.401251][T13640] CPU: 0 UID: 0 PID: 13640 Comm: syz.0.9482 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 6648.401342][T13640] Hardware name: ARM-Versatile Express [ 6648.401357][T13640] Call trace: [ 6648.401381][T13640] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6648.401440][T13640] r7:00000820 r6:00000000 r5:60000013 r4:82260dd4 [ 6648.401449][T13640] [<80201b08>] (show_stack) from [<8021fb98>] (dump_stack_lvl+0x70/0x7c) [ 6648.401474][T13640] [<8021fb28>] (dump_stack_lvl) from [<8021fbbc>] (dump_stack+0x18/0x1c) [ 6648.401500][T13640] r5:8581ec00 r4:82917bc0 [ 6648.401507][T13640] [<8021fba4>] (dump_stack) from [<80972360>] (should_fail_ex+0x1c4/0x228) [ 6648.401535][T13640] [<8097219c>] (should_fail_ex) from [<8051f748>] (should_failslab+0x6c/0x94) [ 6648.401567][T13640] r8:8581ec00 r7:00000820 r6:85417dd8 r5:00000017 r4:83001240 [ 6648.401576][T13640] [<8051f6dc>] (should_failslab) from [<80504ddc>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 6648.401601][T13640] [<80504d3c>] (__kmalloc_node_track_caller_noprof) from [<8049b5e4>] (kmemdup_noprof+0x28/0x44) [ 6648.401768][T13640] r10:00000000 r9:84050604 r8:dfa3dbcc r7:83a8a000 r6:85417dd8 r5:dfa3dbc4 [ 6648.401903][T13640] r4:00000017 [ 6648.402037][T13640] [<8049b5bc>] (kmemdup_noprof) from [<807a1fa8>] (sidtab_sid2str_get+0x54/0xa4) [ 6648.402070][T13640] r7:83a8a000 r6:dfa3dbcc r5:dfa3dbc4 r4:832f10c0 [ 6648.402078][T13640] [<807a1f54>] (sidtab_sid2str_get) from [<807a94b0>] (sidtab_entry_to_string+0x34/0x94) [ 6648.402120][T13640] r7:83a8a000 r6:832f10c0 r5:dfa3dbc4 r4:0000005f [ 6648.402141][T13640] [<807a947c>] (sidtab_entry_to_string) from [<807a9628>] (security_sid_to_context_core+0x118/0x17c) [ 6648.402327][T13640] r9:dfa3dcec r8:83a8a000 r7:84050604 r6:dfa3dbcc r5:dfa3dbc4 r4:0000005f [ 6648.402336][T13640] [<807a9510>] (security_sid_to_context_core) from [<807ac63c>] (security_sid_to_context+0x1c/0x24) [ 6648.402647][T13640] r8:8078c760 r7:8078d764 r6:8581ec00 r5:83337910 r4:dfa3dc58 [ 6648.402791][T13640] [<807ac620>] (security_sid_to_context) from [<8078d7ac>] (avc_audit_post_callback+0x48/0x2f4) [ 6648.402850][T13640] [<8078d764>] (avc_audit_post_callback) from [<807b4bf8>] (common_lsm_audit+0x104/0x148) [ 6648.402884][T13640] r10:00000000 r9:dfa3dcec r8:8078c760 r7:8078d764 r6:dfa3dcec r5:83337910 [ 6648.402894][T13640] r4:8581f3f0 [ 6648.402901][T13640] [<807b4af4>] (common_lsm_audit) from [<8078dc70>] (slow_avc_audit+0xbc/0x114) [ 6648.403013][T13640] r8:0000002c r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 6648.403024][T13640] [<8078dbb4>] (slow_avc_audit) from [<8078e6f4>] (avc_has_perm+0xd8/0xe8) [ 6648.403081][T13640] r5:00000000 r4:00000004 [ 6648.403091][T13640] [<8078e61c>] (avc_has_perm) from [<80794b0c>] (sock_has_perm+0xd0/0xfc) [ 6648.403148][T13640] r9:dfa3ddc4 r8:8581ec00 r7:85cb6cc0 r6:00000004 r5:8548a800 r4:00000000 [ 6648.403159][T13640] [<80794a3c>] (sock_has_perm) from [<80794bc0>] (selinux_socket_sendmsg+0x18/0x1c) [ 6648.403216][T13640] r8:dfa3ddc4 r7:00000000 r6:0000002c r5:dfa3df20 r4:8518ea00 [ 6648.403329][T13640] [<80794ba8>] (selinux_socket_sendmsg) from [<80787144>] (security_socket_sendmsg+0x64/0x1e4) [ 6648.403355][T13640] [<807870e0>] (security_socket_sendmsg) from [<815420c4>] (__sock_sendmsg+0x1c/0x78) [ 6648.403444][T13640] r7:00000000 r6:8518ea00 r5:dfa3df20 r4:dfa3df20 [ 6648.403511][T13640] [<815420a8>] (__sock_sendmsg) from [<81543440>] (____sys_sendmsg+0x298/0x2cc) [ 6648.403626][T13640] r7:00000000 r6:8518ea00 r5:20000012 r4:dfa3df20 [ 6648.403731][T13640] [<815431a8>] (____sys_sendmsg) from [<81545408>] (___sys_sendmsg+0x9c/0xd0) [ 6648.403801][T13640] r10:dfa3de24 r9:20000240 r8:20000012 r7:00000000 r6:8518ea00 r5:dfa3df20 [ 6648.403838][T13640] r4:00000000 [ 6648.403874][T13640] [<8154536c>] (___sys_sendmsg) from [<815458a0>] (__sys_sendmsg+0x8c/0xe0) [ 6648.403909][T13640] r10:00000128 r9:8581ec00 r8:86e39180 r7:20000012 r6:20000240 r5:86e39181 [ 6648.403945][T13640] r4:00000003 [ 6648.403954][T13640] [<81545814>] (__sys_sendmsg) from [<81545908>] (sys_sendmsg+0x14/0x18) [ 6648.403985][T13640] r8:8020029c r7:00000128 r6:001301a0 r5:00000000 r4:00000000 [ 6648.403993][T13640] [<815458f4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6648.404015][T13640] Exception stack(0xdfa3dfa8 to 0xdfa3dff0) [ 6648.404035][T13640] dfa0: 00000000 00000000 00000003 20000240 20000012 00000000 [ 6648.404050][T13640] dfc0: 00000000 00000000 001301a0 00000128 002e0000 00000000 00006364 76bab0bc [ 6648.404062][T13640] dfe0: 76baaec0 76baaeb0 000193dc 001321f0 [ 6652.899643][ T31] kauditd_printk_skb: 182 callbacks suppressed [ 6652.899922][ T31] audit: type=1400 audit(6652.840:176325): avc: denied { read write } for pid=13656 comm="syz.1.9489" name="sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6652.900168][ T31] audit: type=1400 audit(6652.850:176326): avc: denied { open } for pid=13656 comm="syz.1.9489" path="/dev/sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6652.911462][ T31] audit: type=1400 audit(6652.860:176327): avc: denied { ioctl } for pid=13656 comm="syz.1.9489" path="/dev/sequencer" dev="devtmpfs" ino=720 ioctlcmd=0x1288 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6652.927349][ T31] audit: type=1400 audit(6652.880:176328): avc: denied { read } for pid=13657 comm="syz.0.9490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6652.928833][T13663] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5129 sclass=netlink_route_socket pid=13663 comm=syz.1.9489 [ 6653.060347][ T31] audit: type=1400 audit(6653.010:176329): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6653.071668][ T31] audit: type=1400 audit(6653.020:176330): avc: denied { recv } for pid=13656 comm="syz.1.9489" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6653.106375][ T31] audit: type=1400 audit(6653.060:176331): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6653.108108][ T31] audit: type=1400 audit(6653.060:176332): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6653.108773][ T31] audit: type=1400 audit(6653.060:176333): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6653.121523][ T31] audit: type=1400 audit(6653.070:176334): avc: denied { recv } for pid=13656 comm="syz.1.9489" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6654.394583][T13674] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=13674 comm=syz.1.9494 [ 6657.177142][T13693] FAULT_INJECTION: forcing a failure. [ 6657.177142][T13693] name failslab, interval 1, probability 0, space 0, times 0 [ 6657.193729][T13693] CPU: 1 UID: 0 PID: 13693 Comm: syz.1.9500 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 6657.193875][T13693] Hardware name: ARM-Versatile Express [ 6657.193902][T13693] Call trace: [ 6657.193943][T13693] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6657.194058][T13693] r7:84841800 r6:00000000 r5:60000113 r4:82260dd4 [ 6657.194080][T13693] [<80201b08>] (show_stack) from [<8021fb98>] (dump_stack_lvl+0x70/0x7c) [ 6657.194135][T13693] [<8021fb28>] (dump_stack_lvl) from [<8021fbbc>] (dump_stack+0x18/0x1c) [ 6657.194190][T13693] r5:84841800 r4:82917bc0 [ 6657.194206][T13693] [<8021fba4>] (dump_stack) from [<80972360>] (should_fail_ex+0x1c4/0x228) [ 6657.194266][T13693] [<8097219c>] (should_fail_ex) from [<8051f748>] (should_failslab+0x6c/0x94) [ 6657.194332][T13693] r8:00000000 r7:84841800 r6:00000cc0 r5:20002140 r4:830016c0 [ 6657.194352][T13693] [<8051f6dc>] (should_failslab) from [<80503158>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 6657.194397][T13693] [<8050310c>] (__kmalloc_cache_noprof) from [<80586a8c>] (sys_mount+0x94/0x260) [ 6657.194458][T13693] r10:00000015 r9:84841800 r8:8020029c r7:00000000 r6:85bcc100 r5:20002140 [ 6657.194478][T13693] r4:20002140 [ 6657.194494][T13693] [<805869f8>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6657.194536][T13693] Exception stack(0xdfa75fa8 to 0xdfa75ff0) [ 6657.194573][T13693] 5fa0: 20002140 00000000 00000000 200020c0 20002100 00000000 [ 6657.194606][T13693] 5fc0: 20002140 00000000 001301a0 00000015 002e0000 00000000 00006364 76b740bc [ 6657.194631][T13693] 5fe0: 76b73ec0 76b73eb0 000193dc 001321f0 [ 6657.194662][T13693] r10:00000015 r9:84841800 r8:8020029c r7:00000015 r6:001301a0 r5:00000000 [ 6657.194681][T13693] r4:20002140 [ 6659.054771][ T31] kauditd_printk_skb: 165 callbacks suppressed [ 6659.055052][ T31] audit: type=1400 audit(6659.010:176498): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6659.076471][ T31] audit: type=1400 audit(6659.020:176499): avc: denied { recv } for pid=11770 comm="syz.0.8987" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6659.104551][ T31] audit: type=1400 audit(6659.030:176500): avc: denied { unmount } for pid=9478 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6659.105552][ T31] audit: type=1400 audit(6659.060:176501): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6659.107030][ T31] audit: type=1400 audit(6659.060:176502): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6659.108117][ T31] audit: type=1400 audit(6659.060:176503): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6659.114255][ T31] audit: type=1400 audit(6659.060:176504): avc: denied { recv } for pid=11770 comm="syz.0.8987" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6659.128584][ T31] audit: type=1400 audit(6659.080:176505): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6659.128941][ T31] audit: type=1400 audit(6659.080:176506): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6670.042877][ T31] audit: type=1400 audit(6669.990:176507): avc: denied { read write } for pid=9478 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6670.071726][ T31] audit: type=1400 audit(6670.020:176508): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6670.086678][ T31] audit: type=1400 audit(6670.040:176509): avc: denied { recv } for pid=20940 comm="kworker/0:2" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6670.127535][ T31] audit: type=1400 audit(6670.070:176510): avc: denied { recv } for pid=3040 comm="kworker/u10:5" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6670.127889][ T31] audit: type=1400 audit(6670.070:176511): avc: denied { recv } for pid=3040 comm="kworker/u10:5" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6670.128118][ T31] audit: type=1400 audit(6670.070:176512): avc: denied { recv } for pid=3040 comm="kworker/u10:5" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6670.128312][ T31] audit: type=1400 audit(6670.080:176513): avc: denied { recv } for pid=11918 comm="syz.1.9041" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6670.128532][ T31] audit: type=1400 audit(6670.080:176514): avc: denied { recv } for pid=11918 comm="syz.1.9041" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6670.137136][ T31] audit: type=1400 audit(6670.080:176515): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6670.139146][ T31] audit: type=1400 audit(6670.090:176516): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6675.125955][ T31] kauditd_printk_skb: 85 callbacks suppressed [ 6675.126223][ T31] audit: type=1400 audit(6675.080:176602): avc: denied { write } for pid=13708 comm="syz.0.9506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6675.710048][ T31] audit: type=1400 audit(6675.660:176603): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6675.719597][ T31] audit: type=1400 audit(6675.670:176604): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6675.784217][ T31] audit: type=1400 audit(6675.730:176605): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6675.790761][ T31] audit: type=1400 audit(6675.740:176606): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6675.791164][ T31] audit: type=1400 audit(6675.740:176607): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6675.799307][ T31] audit: type=1400 audit(6675.750:176608): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6675.807527][ T31] audit: type=1400 audit(6675.760:176609): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6675.807839][ T31] audit: type=1400 audit(6675.760:176610): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6675.813786][ T31] audit: type=1400 audit(6675.760:176611): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6689.813754][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 6689.813891][ T31] audit: type=1400 audit(6689.760:176640): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6689.824512][ T31] audit: type=1400 audit(6689.780:176641): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6689.862590][ T31] audit: type=1400 audit(6689.810:176642): avc: denied { read write } for pid=9478 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6689.876460][ T31] audit: type=1400 audit(6689.820:176643): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6689.876573][ T31] audit: type=1400 audit(6689.830:176644): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6689.876625][ T31] audit: type=1400 audit(6689.830:176645): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6689.881962][ T31] audit: type=1400 audit(6689.830:176646): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6689.882104][ T31] audit: type=1400 audit(6689.830:176647): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6689.917177][ T31] audit: type=1400 audit(6689.860:176648): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6689.919372][ T31] audit: type=1400 audit(6689.860:176649): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6693.856204][ T4285] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6693.970070][ T4285] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6694.245734][ T4285] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6694.375459][ T4285] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6694.824689][ T31] kauditd_printk_skb: 123 callbacks suppressed [ 6694.824979][ T31] audit: type=1400 audit(6694.770:176773): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6694.847516][ T31] audit: type=1400 audit(6694.800:176774): avc: denied { recv } for pid=2974 comm="dhcpcd" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6694.854750][ T31] audit: type=1400 audit(6694.800:176775): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6694.854991][ T31] audit: type=1400 audit(6694.810:176776): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6694.868340][ T31] audit: type=1400 audit(6694.820:176777): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6694.868595][ T31] audit: type=1400 audit(6694.820:176778): avc: denied { open } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6695.015359][ T31] audit: type=1400 audit(6694.970:176779): avc: denied { ioctl } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6695.179266][ T31] audit: type=1400 audit(6695.130:176780): avc: denied { read } for pid=13767 comm="syz.0.9514" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6695.180656][ T31] audit: type=1400 audit(6695.130:176781): avc: denied { open } for pid=13767 comm="syz.0.9514" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6695.189399][ T31] audit: type=1400 audit(6695.140:176782): avc: denied { ioctl } for pid=13767 comm="syz.0.9514" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c02 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6695.350344][ T4285] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6695.357141][ T4285] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6695.368573][ T4285] bond0 (unregistering): Released all slaves [ 6695.545374][ T4285] hsr_slave_0: left promiscuous mode [ 6695.547412][ T4285] hsr_slave_1: left promiscuous mode [ 6695.595872][ T4285] veth1_macvtap: left promiscuous mode [ 6695.596244][ T4285] veth0_macvtap: left promiscuous mode [ 6695.596674][ T4285] veth1_vlan: left promiscuous mode [ 6695.596824][ T4285] veth0_vlan: left promiscuous mode [ 6695.784544][T13772] FAULT_INJECTION: forcing a failure. [ 6695.784544][T13772] name failslab, interval 1, probability 0, space 0, times 0 [ 6695.843914][T13772] CPU: 0 UID: 0 PID: 13772 Comm: syz.0.9515 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 6695.844063][T13772] Hardware name: ARM-Versatile Express [ 6695.844086][T13772] Call trace: [ 6695.844126][T13772] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6695.844232][T13772] r7:00000820 r6:00000000 r5:60000113 r4:82260dd4 [ 6695.844251][T13772] [<80201b08>] (show_stack) from [<8021fb98>] (dump_stack_lvl+0x70/0x7c) [ 6695.844303][T13772] [<8021fb28>] (dump_stack_lvl) from [<8021fbbc>] (dump_stack+0x18/0x1c) [ 6695.844350][T13772] r5:8415ec00 r4:82917bc0 [ 6695.844364][T13772] [<8021fba4>] (dump_stack) from [<80972360>] (should_fail_ex+0x1c4/0x228) [ 6695.844444][T13772] [<8097219c>] (should_fail_ex) from [<8051f748>] (should_failslab+0x6c/0x94) [ 6695.844502][T13772] r8:8415ec00 r7:00000820 r6:85417dd8 r5:00000017 r4:83001240 [ 6695.844517][T13772] [<8051f6dc>] (should_failslab) from [<80504ddc>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 6695.844561][T13772] [<80504d3c>] (__kmalloc_node_track_caller_noprof) from [<8049b5e4>] (kmemdup_noprof+0x28/0x44) [ 6695.844641][T13772] r10:00000000 r9:84050604 r8:dfa05bcc r7:83a8a000 r6:85417dd8 r5:dfa05bc4 [ 6695.844658][T13772] r4:00000017 [ 6695.844672][T13772] [<8049b5bc>] (kmemdup_noprof) from [<807a1fa8>] (sidtab_sid2str_get+0x54/0xa4) [ 6695.844740][T13772] r7:83a8a000 r6:dfa05bcc r5:dfa05bc4 r4:832f10c0 [ 6695.844755][T13772] [<807a1f54>] (sidtab_sid2str_get) from [<807a94b0>] (sidtab_entry_to_string+0x34/0x94) [ 6695.844807][T13772] r7:83a8a000 r6:832f10c0 r5:dfa05bc4 r4:0000005f [ 6695.844821][T13772] [<807a947c>] (sidtab_entry_to_string) from [<807a9628>] (security_sid_to_context_core+0x118/0x17c) [ 6695.844872][T13772] r9:dfa05cec r8:83a8a000 r7:84050604 r6:dfa05bcc r5:dfa05bc4 r4:0000005f [ 6695.844887][T13772] [<807a9510>] (security_sid_to_context_core) from [<807ac63c>] (security_sid_to_context+0x1c/0x24) [ 6695.844937][T13772] r8:8078c760 r7:8078d764 r6:8415ec00 r5:833378e0 r4:dfa05c58 [ 6695.844952][T13772] [<807ac620>] (security_sid_to_context) from [<8078d7ac>] (avc_audit_post_callback+0x48/0x2f4) [ 6695.844998][T13772] [<8078d764>] (avc_audit_post_callback) from [<807b4bf8>] (common_lsm_audit+0x104/0x148) [ 6695.845055][T13772] r10:00000000 r9:dfa05cec r8:8078c760 r7:8078d764 r6:dfa05cec r5:833378e0 [ 6695.845072][T13772] r4:8415f3f0 [ 6695.845085][T13772] [<807b4af4>] (common_lsm_audit) from [<8078dc70>] (slow_avc_audit+0xbc/0x114) [ 6695.845137][T13772] r8:0000002c r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 6695.845151][T13772] [<8078dbb4>] (slow_avc_audit) from [<8078e6f4>] (avc_has_perm+0xd8/0xe8) [ 6695.845195][T13772] r5:00000000 r4:00000004 [ 6695.845209][T13772] [<8078e61c>] (avc_has_perm) from [<80794b0c>] (sock_has_perm+0xd0/0xfc) [ 6695.845259][T13772] r9:dfa05dc4 r8:8415ec00 r7:85c64f80 r6:00000004 r5:8548a400 r4:00000000 [ 6695.845274][T13772] [<80794a3c>] (sock_has_perm) from [<80794bc0>] (selinux_socket_sendmsg+0x18/0x1c) [ 6695.845321][T13772] r8:dfa05dc4 r7:00000000 r6:00000014 r5:dfa05f20 r4:8518e780 [ 6695.845335][T13772] [<80794ba8>] (selinux_socket_sendmsg) from [<80787144>] (security_socket_sendmsg+0x64/0x1e4) [ 6695.845372][T13772] [<807870e0>] (security_socket_sendmsg) from [<815420c4>] (__sock_sendmsg+0x1c/0x78) [ 6695.845425][T13772] r7:00000000 r6:8518e780 r5:dfa05f20 r4:dfa05f20 [ 6695.845440][T13772] [<815420a8>] (__sock_sendmsg) from [<81543440>] (____sys_sendmsg+0x298/0x2cc) [ 6695.845491][T13772] r7:00000000 r6:8518e780 r5:00000010 r4:dfa05f20 [ 6695.845504][T13772] [<815431a8>] (____sys_sendmsg) from [<81545408>] (___sys_sendmsg+0x9c/0xd0) [ 6695.845561][T13772] r10:dfa05e24 r9:20000540 r8:00000010 r7:00000000 r6:8518e780 r5:dfa05f20 [ 6695.845576][T13772] r4:00000000 [ 6695.845588][T13772] [<8154536c>] (___sys_sendmsg) from [<815458a0>] (__sys_sendmsg+0x8c/0xe0) [ 6695.845643][T13772] r10:00000128 r9:8415ec00 r8:86087180 r7:00000010 r6:20000540 r5:86087181 [ 6695.845660][T13772] r4:00000004 [ 6695.845673][T13772] [<81545814>] (__sys_sendmsg) from [<81545908>] (sys_sendmsg+0x14/0x18) [ 6695.845735][T13772] r8:8020029c r7:00000128 r6:001301a0 r5:00000000 r4:00000000 [ 6695.845750][T13772] [<815458f4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6695.845792][T13772] Exception stack(0xdfa05fa8 to 0xdfa05ff0) [ 6695.845827][T13772] 5fa0: 00000000 00000000 00000004 20000540 00000010 00000000 [ 6695.845858][T13772] 5fc0: 00000000 00000000 001301a0 00000128 002e0000 00000000 00006364 76bab0bc [ 6695.845882][T13772] 5fe0: 76baaec0 76baaeb0 000193dc 001321f0 [ 6697.614193][T13805] FAULT_INJECTION: forcing a failure. [ 6697.614193][T13805] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6697.614596][T13805] CPU: 0 UID: 0 PID: 13805 Comm: syz.0.9516 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 6697.614695][T13805] Hardware name: ARM-Versatile Express [ 6697.614723][T13805] Call trace: [ 6697.614772][T13805] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6697.614871][T13805] r7:b5403587 r6:00000000 r5:60060113 r4:82260dd4 [ 6697.614890][T13805] [<80201b08>] (show_stack) from [<8021fb98>] (dump_stack_lvl+0x70/0x7c) [ 6697.614957][T13805] [<8021fb28>] (dump_stack_lvl) from [<8021fbbc>] (dump_stack+0x18/0x1c) [ 6697.615011][T13805] r5:83aa8000 r4:8294f150 [ 6697.615026][T13805] [<8021fba4>] (dump_stack) from [<80972360>] (should_fail_ex+0x1c4/0x228) [ 6697.615082][T13805] [<8097219c>] (should_fail_ex) from [<809723d8>] (should_fail+0x14/0x18) [ 6697.615142][T13805] r8:00000000 r7:b5403587 r6:00000000 r5:83aa8830 r4:76b89ca0 [ 6697.615159][T13805] [<809723c4>] (should_fail) from [<809723f8>] (should_fail_usercopy+0x1c/0x20) [ 6697.615209][T13805] [<809723dc>] (should_fail_usercopy) from [<8022b2e4>] (preserve_vfp_context+0x78/0xc4) [ 6697.615264][T13805] [<8022b26c>] (preserve_vfp_context) from [<8022b6ac>] (setup_sigframe+0x16c/0x1c4) [ 6697.615318][T13805] r5:83aa8830 r4:76b89bb8 [ 6697.615336][T13805] [<8022b540>] (setup_sigframe) from [<8022bacc>] (do_work_pending+0x2f4/0x4f8) [ 6697.615399][T13805] r10:00000128 r9:b5403587 r8:00000000 r7:83aa8830 r6:76b89bb8 r5:dfa71fb0 [ 6697.615419][T13805] r4:83aa8000 [ 6697.615435][T13805] [<8022b7d8>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 6697.615483][T13805] Exception stack(0xdfa71fb0 to 0xdfa71ff8) [ 6697.615519][T13805] 1fa0: fffffffc 200001c0 04000800 00000000 [ 6697.615556][T13805] 1fc0: 00000000 00000000 001301a0 00000128 002e0000 00000000 00006364 76b8a0bc [ 6697.615586][T13805] 1fe0: 76b89ec0 76b89eb0 000193dc 001321f0 60000010 00000003 [ 6697.615622][T13805] r10:00000128 r9:83aa8000 r8:8020029c r7:00000128 r6:001301a0 r5:00000000 [ 6697.615642][T13805] r4:00000000 [ 6699.168392][T13741] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6699.189866][T13741] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6699.869105][ T31] kauditd_printk_skb: 234 callbacks suppressed [ 6699.869483][ T31] audit: type=1400 audit(6699.820:177015): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6699.869814][ T31] audit: type=1400 audit(6699.820:177016): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6699.870058][ T31] audit: type=1400 audit(6699.820:177017): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6699.885618][ T31] audit: type=1400 audit(6699.840:177018): avc: denied { recv } for pid=13967 comm="modprobe" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6699.894824][ T31] audit: type=1400 audit(6699.840:177019): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6699.896900][ T31] audit: type=1400 audit(6699.850:177020): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6699.906559][ T31] audit: type=1400 audit(6699.860:177021): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6699.925249][ T31] audit: type=1400 audit(6699.880:177022): avc: denied { read write open } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6699.927485][ T31] audit: type=1400 audit(6699.880:177023): avc: denied { ioctl } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6699.964252][ T31] audit: type=1400 audit(6699.900:177024): avc: denied { sys_module } for pid=13741 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6700.988899][T13741] hsr_slave_0: entered promiscuous mode [ 6700.997228][T13741] hsr_slave_1: entered promiscuous mode [ 6701.000176][T13741] debugfs: 'hsr0' already exists in 'hsr' [ 6701.001070][T13741] Cannot create hsr debugfs directory [ 6701.760241][T13741] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 6701.770243][T13741] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 6701.776449][T13741] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 6701.781272][T13741] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 6702.771046][T13741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6704.888587][ T31] kauditd_printk_skb: 396 callbacks suppressed [ 6704.888952][ T31] audit: type=1400 audit(6704.840:177421): avc: denied { create } for pid=14160 comm="syz.0.9525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6704.896496][ T31] audit: type=1400 audit(6704.850:177422): avc: denied { write } for pid=14160 comm="syz.0.9525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6704.897963][ T31] audit: type=1400 audit(6704.850:177423): avc: denied { module_request } for pid=14160 comm="syz.0.9525" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6705.028052][ T31] audit: type=1400 audit(6704.980:177424): avc: denied { write } for pid=14168 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6705.033824][ T31] audit: type=1400 audit(6704.980:177425): avc: denied { open } for pid=14168 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6705.038858][ T31] audit: type=1400 audit(6704.990:177426): avc: denied { sys_module } for pid=13741 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6705.040460][ T31] audit: type=1400 audit(6704.990:177427): avc: denied { module_request } for pid=13741 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6705.070572][ T31] audit: type=1400 audit(6705.010:177428): avc: denied { search } for pid=14168 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6705.072584][ T31] audit: type=1400 audit(6705.010:177429): avc: denied { search } for pid=14168 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6705.083724][ T31] audit: type=1400 audit(6705.010:177430): avc: denied { search } for pid=14168 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6707.971910][T14208] FAULT_INJECTION: forcing a failure. [ 6707.971910][T14208] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 6707.972135][T14208] CPU: 0 UID: 0 PID: 14208 Comm: syz.0.9528 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 6707.972189][T14208] Hardware name: ARM-Versatile Express [ 6707.972201][T14208] Call trace: [ 6707.972227][T14208] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6707.972317][T14208] r7:00000000 r6:00000000 r5:60000113 r4:82260dd4 [ 6707.972328][T14208] [<80201b08>] (show_stack) from [<8021fb98>] (dump_stack_lvl+0x70/0x7c) [ 6707.972355][T14208] [<8021fb28>] (dump_stack_lvl) from [<8021fbbc>] (dump_stack+0x18/0x1c) [ 6707.972381][T14208] r5:85e82400 r4:82917c14 [ 6707.972388][T14208] [<8021fba4>] (dump_stack) from [<80972360>] (should_fail_ex+0x1c4/0x228) [ 6707.972472][T14208] [<8097219c>] (should_fail_ex) from [<8051f7d8>] (should_fail_alloc_page+0x68/0x74) [ 6707.972508][T14208] r8:00000001 r7:00000000 r6:00000000 r5:00440dc2 r4:dfe31c30 [ 6707.972517][T14208] [<8051f770>] (should_fail_alloc_page) from [<804edad4>] (prepare_alloc_pages.constprop.0+0x94/0x1b0) [ 6707.972541][T14208] [<804eda40>] (prepare_alloc_pages.constprop.0) from [<804f5ffc>] (__alloc_frozen_pages_noprof+0xac/0x10d0) [ 6707.972572][T14208] r10:dfe31e48 r9:00000000 r8:85e82400 r7:00000000 r6:00440dc2 r5:85da9040 [ 6707.972584][T14208] r4:00000000 r3:dfe31c30 [ 6707.972592][T14208] [<804f5f50>] (__alloc_frozen_pages_noprof) from [<804f7030>] (__alloc_pages_noprof+0x10/0x60) [ 6707.972677][T14208] r10:dfe31e48 r9:85e5ad00 r8:85bf4900 r7:00000000 r6:20000000 r5:85da9040 [ 6707.972758][T14208] r4:85da9040 [ 6707.972779][T14208] [<804f7020>] (__alloc_pages_noprof) from [<804c079c>] (pte_alloc_one+0x28/0x114) [ 6707.972838][T14208] [<804c0774>] (pte_alloc_one) from [<804c2008>] (__pte_alloc+0x2c/0x104) [ 6707.973099][T14208] r5:8bc05800 r4:85da9040 [ 6707.973122][T14208] [<804c1fdc>] (__pte_alloc) from [<804c7700>] (handle_mm_fault+0xfc0/0x14dc) [ 6707.973186][T14208] r5:85e82400 r4:00000215 [ 6707.973243][T14208] [<804c6740>] (handle_mm_fault) from [<80234214>] (do_page_fault+0xec/0x49c) [ 6707.973345][T14208] r10:00000002 r9:85da9040 r8:00000215 r7:20000000 r6:00000a06 r5:20000000 [ 6707.973429][T14208] r4:dfe31e48 [ 6707.973562][T14208] [<80234128>] (do_page_fault) from [<80234744>] (do_translation_fault+0xfc/0x12c) [ 6707.973634][T14208] r10:00000064 r9:85e82400 r8:80234648 r7:dfe31e48 r6:20000000 r5:00000a06 [ 6707.973679][T14208] r4:8281cee0 [ 6707.973687][T14208] [<80234648>] (do_translation_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 6707.973732][T14208] r9:85e82400 r8:80234648 r7:dfe31e48 r6:20000000 r5:00000a06 r4:8281cee0 [ 6707.973751][T14208] [<80234774>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 6707.973793][T14208] Exception stack(0xdfe31e48 to 0xdfe31e90) [ 6707.973814][T14208] 1e40: 20000000 dfe31ee4 ffffffa0 534f434b 00001000 00000000 [ 6707.973831][T14208] 1e60: 00000000 00000000 00000000 00000000 00000064 dfe31f2c 00000000 dfe31e9c [ 6707.973842][T14208] 1e80: 00000009 81a070c0 a0000013 ffffffff [ 6707.973857][T14208] r8:00000000 r7:dfe31e7c r6:ffffffff r5:a0000013 r4:81a070c0 [ 6707.973865][T14208] [<805a2850>] (do_statfs_native) from [<805a2c7c>] (sys_fstatfs+0x78/0x80) [ 6707.973895][T14208] r8:8020029c r7:00000064 r6:001301a0 r5:20000000 r4:00000003 [ 6707.973937][T14208] [<805a2c04>] (sys_fstatfs) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6707.973974][T14208] Exception stack(0xdfe31fa8 to 0xdfe31ff0) [ 6707.974007][T14208] 1fa0: 00000000 00000000 00000003 20000000 00000000 00000000 [ 6707.974039][T14208] 1fc0: 00000000 00000000 001301a0 00000064 002e0000 00000000 00006364 76bab0bc [ 6707.974060][T14208] 1fe0: 76baaec0 76baaeb0 000193dc 001321f0 [ 6707.974072][T14208] r5:00000000 r4:00000000 [ 6708.056374][T13741] veth0_vlan: entered promiscuous mode [ 6708.165739][T13741] veth1_vlan: entered promiscuous mode [ 6708.318247][T13741] veth0_macvtap: entered promiscuous mode [ 6708.333455][T13741] veth1_macvtap: entered promiscuous mode [ 6708.512628][ T4285] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6708.516479][ T4285] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6708.516857][ T4285] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6708.517121][ T4285] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6709.900642][ T31] kauditd_printk_skb: 456 callbacks suppressed [ 6709.900955][ T31] audit: type=1400 audit(6709.850:177887): avc: denied { search } for pid=14227 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.901200][ T31] audit: type=1400 audit(6709.850:177888): avc: denied { search } for pid=14227 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.901383][ T31] audit: type=1400 audit(6709.850:177889): avc: denied { search } for pid=14227 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.901573][ T31] audit: type=1400 audit(6709.850:177890): avc: denied { read open } for pid=14227 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.901784][ T31] audit: type=1400 audit(6709.850:177891): avc: denied { getattr } for pid=14227 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.908230][ T31] audit: type=1400 audit(6709.860:177892): avc: denied { search } for pid=14227 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.908371][ T31] audit: type=1400 audit(6709.860:177893): avc: denied { search } for pid=14227 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.908460][ T31] audit: type=1400 audit(6709.860:177894): avc: denied { search } for pid=14227 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.908505][ T31] audit: type=1400 audit(6709.860:177895): avc: denied { search } for pid=14227 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.959156][ T31] audit: type=1400 audit(6709.910:177896): avc: denied { add_name } for pid=14226 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6715.839517][ T31] kauditd_printk_skb: 292 callbacks suppressed [ 6715.840624][ T31] audit: type=1400 audit(6715.780:178189): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6715.842432][ T31] audit: type=1400 audit(6715.780:178190): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6715.845911][ T31] audit: type=1400 audit(6715.790:178191): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6715.848046][ T31] audit: type=1400 audit(6715.790:178192): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6715.888374][ T31] audit: type=1400 audit(6715.830:178193): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6716.053617][ T31] audit: type=1400 audit(6715.990:178194): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6716.054068][ T31] audit: type=1400 audit(6715.990:178195): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6716.054301][ T31] audit: type=1400 audit(6715.990:178196): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6716.054498][ T31] audit: type=1400 audit(6715.990:178197): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6716.054700][ T31] audit: type=1400 audit(6716.000:178198): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6720.214193][T10819] usb 2-1: new high-speed USB device number 117 using dummy_hcd [ 6720.374796][T10819] usb 2-1: Using ep0 maxpacket: 32 [ 6720.451586][T10819] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 6720.451910][T10819] usb 2-1: can't read configurations, error -61 [ 6720.584898][T10819] usb 2-1: new high-speed USB device number 118 using dummy_hcd [ 6720.733668][T10819] usb 2-1: Using ep0 maxpacket: 32 [ 6720.744092][ T7447] usb 1-1: new full-speed USB device number 107 using dummy_hcd [ 6720.762594][T10819] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 6720.763326][T10819] usb 2-1: can't read configurations, error -61 [ 6720.764380][T10819] usb usb2-port1: attempt power cycle [ 6720.873816][ T7447] usb 1-1: device descriptor read/64, error -71 [ 6721.104050][T10819] usb 2-1: new high-speed USB device number 119 using dummy_hcd [ 6721.114086][ T7447] usb 1-1: new full-speed USB device number 108 using dummy_hcd [ 6721.135738][T10819] usb 2-1: Using ep0 maxpacket: 32 [ 6721.150088][T10819] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 6721.150415][T10819] usb 2-1: can't read configurations, error -61 [ 6721.245181][ T7447] usb 1-1: device descriptor read/64, error -71 [ 6721.273678][T10819] usb 2-1: new high-speed USB device number 120 using dummy_hcd [ 6721.296548][T10819] usb 2-1: Using ep0 maxpacket: 32 [ 6721.311617][T10819] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 6721.311941][T10819] usb 2-1: can't read configurations, error -61 [ 6721.317311][T10819] usb usb2-port1: unable to enumerate USB device [ 6721.355175][ T7447] usb usb1-port1: attempt power cycle [ 6721.693971][ T7447] usb 1-1: new full-speed USB device number 109 using dummy_hcd [ 6721.716871][ T7447] usb 1-1: device descriptor read/8, error -71 [ 6721.953975][ T7447] usb 1-1: new full-speed USB device number 110 using dummy_hcd [ 6721.976588][ T7447] usb 1-1: device descriptor read/8, error -71 [ 6722.084358][ T7447] usb usb1-port1: unable to enumerate USB device [ 6730.016584][ T31] kauditd_printk_skb: 282 callbacks suppressed [ 6730.017529][ T31] audit: type=1400 audit(6729.970:178479): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6730.021542][ T31] audit: type=1400 audit(6729.970:178480): avc: denied { read write } for pid=13741 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6730.024298][ T31] audit: type=1400 audit(6729.970:178481): avc: denied { open } for pid=13741 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6730.025722][ T31] audit: type=1400 audit(6729.970:178482): avc: denied { ioctl } for pid=13741 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6730.032070][ T31] audit: type=1400 audit(6729.980:178483): avc: denied { recv } for pid=11770 comm="syz.0.8987" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6730.070967][ T31] audit: type=1400 audit(6730.020:178484): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6730.073925][ T31] audit: type=1400 audit(6730.020:178485): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6730.075814][ T31] audit: type=1400 audit(6730.020:178486): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6730.084792][ T31] audit: type=1400 audit(6730.040:178487): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6730.090915][ T31] audit: type=1400 audit(6730.040:178488): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6733.199338][T14386] FAULT_INJECTION: forcing a failure. [ 6733.199338][T14386] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6733.201542][T14386] CPU: 1 UID: 0 PID: 14386 Comm: syz.1.9558 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 6733.201678][T14386] Hardware name: ARM-Versatile Express [ 6733.201716][T14386] Call trace: [ 6733.201760][T14386] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6733.201875][T14386] r7:20000980 r6:00000000 r5:60000013 r4:82260dd4 [ 6733.201897][T14386] [<80201b08>] (show_stack) from [<8021fb98>] (dump_stack_lvl+0x70/0x7c) [ 6733.201952][T14386] [<8021fb28>] (dump_stack_lvl) from [<8021fbbc>] (dump_stack+0x18/0x1c) [ 6733.202009][T14386] r5:8330ec00 r4:8294f150 [ 6733.202028][T14386] [<8021fba4>] (dump_stack) from [<80972360>] (should_fail_ex+0x1c4/0x228) [ 6733.202086][T14386] [<8097219c>] (should_fail_ex) from [<809723d8>] (should_fail+0x14/0x18) [ 6733.202149][T14386] r8:00000000 r7:20000980 r6:8bc67d40 r5:00000000 r4:df9f5f20 [ 6733.202167][T14386] [<809723c4>] (should_fail) from [<809723f8>] (should_fail_usercopy+0x1c/0x20) [ 6733.202217][T14386] [<809723dc>] (should_fail_usercopy) from [<808b5a7c>] (_copy_from_iter+0x6c/0x7c8) [ 6733.202273][T14386] [<808b5a10>] (_copy_from_iter) from [<8166fda8>] (netlink_sendmsg+0x18c/0x444) [ 6733.202345][T14386] r10:00000000 r9:00000000 r8:df9f5f30 r7:84bc3000 r6:00000014 r5:85998480 [ 6733.202365][T14386] r4:df9f5f20 [ 6733.202381][T14386] [<8166fc1c>] (netlink_sendmsg) from [<815420ec>] (__sock_sendmsg+0x44/0x78) [ 6733.202450][T14386] r10:00000000 r9:df9f5dc4 r8:df9f5dc4 r7:00000000 r6:837b8a00 r5:df9f5f20 [ 6733.202470][T14386] r4:00000000 [ 6733.202488][T14386] [<815420a8>] (__sock_sendmsg) from [<81543440>] (____sys_sendmsg+0x298/0x2cc) [ 6733.202548][T14386] r7:00000000 r6:837b8a00 r5:00000040 r4:df9f5f20 [ 6733.202567][T14386] [<815431a8>] (____sys_sendmsg) from [<81545408>] (___sys_sendmsg+0x9c/0xd0) [ 6733.202633][T14386] r10:df9f5e24 r9:20000a40 r8:00000040 r7:00000000 r6:837b8a00 r5:df9f5f20 [ 6733.202652][T14386] r4:00000000 [ 6733.202669][T14386] [<8154536c>] (___sys_sendmsg) from [<815458a0>] (__sys_sendmsg+0x8c/0xe0) [ 6733.202745][T14386] r10:00000128 r9:8330ec00 r8:86087c00 r7:00000040 r6:20000a40 r5:86087c01 [ 6733.202766][T14386] r4:00000003 [ 6733.202782][T14386] [<81545814>] (__sys_sendmsg) from [<81545908>] (sys_sendmsg+0x14/0x18) [ 6733.202846][T14386] r8:8020029c r7:00000128 r6:001301a0 r5:00000000 r4:00000000 [ 6733.202863][T14386] [<815458f4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6733.202971][T14386] Exception stack(0xdf9f5fa8 to 0xdf9f5ff0) [ 6733.203012][T14386] 5fa0: 00000000 00000000 00000003 20000a40 00000040 00000000 [ 6733.203045][T14386] 5fc0: 00000000 00000000 001301a0 00000128 002e0000 00000000 00006364 76b670bc [ 6733.203071][T14386] 5fe0: 76b66ec0 76b66eb0 000193dc 001321f0 [ 6735.057245][ T31] kauditd_printk_skb: 233 callbacks suppressed [ 6735.057569][ T31] audit: type=1400 audit(6735.010:178720): avc: denied { create } for pid=14410 comm="syz.1.9564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6735.062141][ T31] audit: type=1400 audit(6735.010:178721): avc: denied { setopt } for pid=14410 comm="syz.1.9564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6735.070731][ T31] audit: type=1400 audit(6735.020:178722): avc: denied { create } for pid=14410 comm="syz.1.9564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6735.091579][ T31] audit: type=1400 audit(6735.040:178723): avc: denied { read write } for pid=14410 comm="syz.1.9564" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6735.094618][ T31] audit: type=1400 audit(6735.040:178724): avc: denied { open } for pid=14410 comm="syz.1.9564" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6735.177391][ T31] audit: type=1400 audit(6735.130:178725): avc: denied { module_request } for pid=14410 comm="syz.1.9564" kmod="netdev-syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6735.329916][ T31] audit: type=1400 audit(6735.280:178726): avc: denied { sys_module } for pid=14410 comm="syz.1.9564" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6735.333771][ T31] audit: type=1400 audit(6735.280:178727): avc: denied { module_request } for pid=14410 comm="syz.1.9564" kmod="syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6735.439332][ T31] audit: type=1400 audit(6735.390:178728): avc: denied { module_request } for pid=14410 comm="syz.1.9564" kmod="netdev-syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6735.601845][ T31] audit: type=1400 audit(6735.550:178729): avc: denied { sys_module } for pid=14410 comm="syz.1.9564" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6737.752040][T14444] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14444 comm=syz.0.9568 [ 6740.320609][ T31] kauditd_printk_skb: 148 callbacks suppressed [ 6740.320868][ T31] audit: type=1400 audit(6740.270:178878): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6740.368239][ T31] audit: type=1400 audit(6740.320:178879): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6740.371941][ T31] audit: type=1400 audit(6740.320:178880): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6740.375411][ T31] audit: type=1400 audit(6740.320:178881): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6740.379429][ T31] audit: type=1400 audit(6740.320:178882): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6740.381389][ T31] audit: type=1400 audit(6740.330:178883): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6740.384363][ T31] audit: type=1400 audit(6740.330:178884): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6740.388661][ T31] audit: type=1400 audit(6740.340:178885): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6740.391291][ T31] audit: type=1400 audit(6740.340:178886): avc: denied { open } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6740.395107][ T31] audit: type=1400 audit(6740.350:178887): avc: denied { ioctl } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6741.830101][T14465] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1001 sclass=netlink_route_socket pid=14465 comm=syz.1.9577 [ 6745.951059][ T31] kauditd_printk_skb: 205 callbacks suppressed [ 6745.951356][ T31] audit: type=1400 audit(6745.900:179093): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6745.969738][ T31] audit: type=1400 audit(6745.920:179094): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6746.003753][ T31] audit: type=1400 audit(6745.950:179095): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6746.005643][ T31] audit: type=1400 audit(6745.960:179096): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6746.007566][ T31] audit: type=1400 audit(6745.960:179097): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6746.014782][ T31] audit: type=1400 audit(6745.970:179098): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6746.016302][ T31] audit: type=1400 audit(6745.970:179099): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6746.058850][ T31] audit: type=1400 audit(6746.010:179100): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6746.060938][ T31] audit: type=1400 audit(6746.010:179101): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6746.175933][ T31] audit: type=1400 audit(6746.130:179102): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6750.965334][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 6750.967235][ T31] audit: type=1400 audit(6750.920:179195): avc: denied { create } for pid=14503 comm="syz.1.9591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6751.022116][ T31] audit: type=1400 audit(6750.970:179196): avc: denied { ioctl } for pid=14503 comm="syz.1.9591" path="socket:[111760]" dev="sockfs" ino=111760 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6751.034407][ T31] audit: type=1400 audit(6750.990:179197): avc: denied { bind } for pid=14503 comm="syz.1.9591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6751.037865][ T31] audit: type=1400 audit(6750.990:179198): avc: denied { write } for pid=14503 comm="syz.1.9591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6751.091627][ T31] audit: type=1400 audit(6751.040:179199): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6751.130970][ T31] audit: type=1400 audit(6751.080:179200): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6751.136269][ T31] audit: type=1400 audit(6751.090:179201): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6751.138191][ T31] audit: type=1400 audit(6751.090:179202): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6751.154331][ T31] audit: type=1400 audit(6751.090:179203): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6751.162360][ T31] audit: type=1400 audit(6751.110:179204): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6754.175149][T32056] hid_parser_main: 5 callbacks suppressed [ 6754.183425][T32056] hid-generic 0004:0080:0005.007E: unknown main item tag 0x0 [ 6754.184034][T32056] hid-generic 0004:0080:0005.007E: unknown main item tag 0x0 [ 6754.184703][T32056] hid-generic 0004:0080:0005.007E: unknown main item tag 0x0 [ 6754.185270][T32056] hid-generic 0004:0080:0005.007E: unknown main item tag 0x0 [ 6754.185775][T32056] hid-generic 0004:0080:0005.007E: unknown main item tag 0x0 [ 6754.186278][T32056] hid-generic 0004:0080:0005.007E: unknown main item tag 0x0 [ 6754.186769][T32056] hid-generic 0004:0080:0005.007E: unknown main item tag 0x0 [ 6754.187259][T32056] hid-generic 0004:0080:0005.007E: unknown main item tag 0x0 [ 6754.189263][T32056] hid-generic 0004:0080:0005.007E: unknown main item tag 0x0 [ 6754.189821][T32056] hid-generic 0004:0080:0005.007E: unknown main item tag 0x0 [ 6754.215460][T32056] hid-generic 0004:0080:0005.007E: hidraw0: HID v0.ff Device [syz0] on syz0 [ 6756.215272][ T31] kauditd_printk_skb: 124 callbacks suppressed [ 6756.215395][ T31] audit: type=1400 audit(6756.170:179329): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6756.224458][ T31] audit: type=1400 audit(6756.180:179330): avc: denied { recv } for pid=10880 comm="syz.0.8715" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6756.238493][ T31] audit: type=1400 audit(6756.190:179331): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6756.244598][ T31] audit: type=1400 audit(6756.200:179332): avc: denied { read write open } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6756.245578][ T31] audit: type=1400 audit(6756.200:179333): avc: denied { ioctl } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6756.265817][ T31] audit: type=1400 audit(6756.220:179334): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6756.265996][ T31] audit: type=1400 audit(6756.220:179335): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6756.266105][ T31] audit: type=1400 audit(6756.220:179336): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6756.275876][ T31] audit: type=1400 audit(6756.230:179337): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6756.276082][ T31] audit: type=1400 audit(6756.230:179338): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6756.773480][T22670] usb 1-1: new high-speed USB device number 111 using dummy_hcd [ 6756.923961][T22670] usb 1-1: Using ep0 maxpacket: 32 [ 6756.937496][T22670] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 242, changing to 11 [ 6756.938201][T22670] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 [ 6756.939096][T22670] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 16 [ 6756.955338][T22670] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 6756.956370][T22670] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6756.957262][T22670] usb 1-1: Product: syz [ 6756.957846][T22670] usb 1-1: Manufacturer: syz [ 6756.958254][T22670] usb 1-1: SerialNumber: syz [ 6757.170767][T14539] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6757.172755][T14539] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6757.393459][T22670] cdc_ncm 1-1:1.0: bind() failure [ 6757.404561][T22670] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 6757.405714][T22670] cdc_ncm 1-1:1.1: bind() failure [ 6757.410341][T22670] usb 1-1: USB disconnect, device number 111 [ 6758.035756][T14544] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=14544 comm=syz.1.9600 [ 6759.887237][T14566] FAULT_INJECTION: forcing a failure. [ 6759.887237][T14566] name failslab, interval 1, probability 0, space 0, times 0 [ 6759.888147][T14566] CPU: 1 UID: 0 PID: 14566 Comm: syz.1.9602 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 6759.888215][T14566] Hardware name: ARM-Versatile Express [ 6759.888230][T14566] Call trace: [ 6759.888251][T14566] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6759.888328][T14566] r7:00000dc0 r6:00000000 r5:60000013 r4:82260dd4 [ 6759.888350][T14566] [<80201b08>] (show_stack) from [<8021fb98>] (dump_stack_lvl+0x70/0x7c) [ 6759.888396][T14566] [<8021fb28>] (dump_stack_lvl) from [<8021fbbc>] (dump_stack+0x18/0x1c) [ 6759.888474][T14566] r5:8386e000 r4:82917bc0 [ 6759.888482][T14566] [<8021fba4>] (dump_stack) from [<80972360>] (should_fail_ex+0x1c4/0x228) [ 6759.888513][T14566] [<8097219c>] (should_fail_ex) from [<8051f748>] (should_failslab+0x6c/0x94) [ 6759.888548][T14566] r8:8386e000 r7:00000dc0 r6:82940140 r5:00000040 r4:83001240 [ 6759.888568][T14566] [<8051f6dc>] (should_failslab) from [<80504978>] (__kmalloc_node_noprof+0xa0/0x464) [ 6759.888616][T14566] [<805048d8>] (__kmalloc_node_noprof) from [<807dc584>] (crypto_alloc_tfmmem+0x38/0x58) [ 6759.888675][T14566] r10:81cef742 r9:86181240 r8:82940140 r7:00000000 r6:82940140 r5:00000cc0 [ 6759.888694][T14566] r4:ffffffff [ 6759.888720][T14566] [<807dc54c>] (crypto_alloc_tfmmem) from [<807dcc7c>] (crypto_create_tfm_node+0x1c/0xe0) [ 6759.888756][T14566] r7:82940140 r6:81cd74b0 r5:00000000 r4:81cd74b0 [ 6759.888765][T14566] [<807dcc60>] (crypto_create_tfm_node) from [<807dd2a0>] (crypto_alloc_tfm_node+0x64/0xb8) [ 6759.888795][T14566] r7:822b384c r6:00000000 r5:00000000 r4:81cd74b0 [ 6759.888802][T14566] [<807dd23c>] (crypto_alloc_tfm_node) from [<807e5714>] (crypto_alloc_shash+0x30/0x38) [ 6759.888839][T14566] r9:86181240 r8:82945980 r7:00000000 r6:00000000 r5:85d7a100 r4:85d7a100 [ 6759.888847][T14566] [<807e56e4>] (crypto_alloc_shash) from [<80813a68>] (jent_kcapi_init+0x2c/0xb0) [ 6759.888872][T14566] [<80813a3c>] (jent_kcapi_init) from [<807dccd0>] (crypto_create_tfm_node+0x70/0xe0) [ 6759.888901][T14566] r7:82945980 r6:00000000 r5:85d7a100 r4:85d7a100 [ 6759.888909][T14566] [<807dcc60>] (crypto_create_tfm_node) from [<807dd2a0>] (crypto_alloc_tfm_node+0x64/0xb8) [ 6759.888939][T14566] r7:822b3798 r6:00000000 r5:00000000 r4:81cef0cc [ 6759.888950][T14566] [<807dd23c>] (crypto_alloc_tfm_node) from [<8080f2f0>] (crypto_alloc_rng+0x30/0x38) [ 6759.888985][T14566] r9:86181240 r8:00000000 r7:ffffffff r6:86181200 r5:00000000 r4:00000000 [ 6759.888997][T14566] [<8080f2c0>] (crypto_alloc_rng) from [<808125b4>] (drbg_kcapi_seed+0x330/0x474) [ 6759.889046][T14566] [<80812284>] (drbg_kcapi_seed) from [<8080f1e8>] (crypto_rng_reset+0x84/0xa0) [ 6759.889100][T14566] r10:00000126 r9:00000001 r8:00000000 r7:86181200 r6:00000000 r5:dfa59ed4 [ 6759.889109][T14566] r4:00000010 [ 6759.889115][T14566] [<8080f164>] (crypto_rng_reset) from [<80817958>] (rng_setkey+0x14/0x18) [ 6759.889147][T14566] r9:00000001 r8:81cefc2c r7:00000000 r6:00000010 r5:dfa59ed4 r4:84bc3c00 [ 6759.889155][T14566] [<80817944>] (rng_setkey) from [<80814b0c>] (alg_setsockopt+0x128/0x3bc) [ 6759.889177][T14566] [<808149e8>] (alg_setsockopt) from [<81541914>] (do_sock_setsockopt+0x70/0xc8) [ 6759.889217][T14566] r10:00000126 r9:8386e000 r8:00000000 r7:836e8a00 r6:00000001 r5:00000117 [ 6759.889232][T14566] r4:808149e4 [ 6759.889242][T14566] [<815418a4>] (do_sock_setsockopt) from [<81544ecc>] (__sys_setsockopt+0x7c/0xc4) [ 6759.889273][T14566] r8:00000000 r7:86c16d80 r6:86c16d81 r5:00000001 r4:00000117 [ 6759.889281][T14566] [<81544e50>] (__sys_setsockopt) from [<81544f30>] (sys_setsockopt+0x1c/0x24) [ 6759.889311][T14566] r8:8020029c r7:00000126 r6:001301a0 r5:00000000 r4:00000000 [ 6759.889319][T14566] [<81544f14>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6759.889341][T14566] Exception stack(0xdfa59fa8 to 0xdfa59ff0) [ 6759.889359][T14566] 9fa0: 00000000 00000000 00000007 00000117 00000001 00000000 [ 6759.889392][T14566] 9fc0: 00000000 00000000 001301a0 00000126 002e0000 00000000 00006364 76b460bc [ 6759.889421][T14566] 9fe0: 76b45ec0 76b45eb0 000193dc 001321f0 [ 6759.909521][T14566] Cannot allocate conditioning digest [ 6759.910658][T14566] DRBG: Continuing without Jitter RNG [ 6761.235967][ T31] kauditd_printk_skb: 124 callbacks suppressed [ 6761.236105][ T31] audit: type=1400 audit(6761.190:179461): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6761.236230][ T31] audit: type=1400 audit(6761.190:179462): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6761.236332][ T31] audit: type=1400 audit(6761.190:179463): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6761.245556][ T31] audit: type=1400 audit(6761.200:179464): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6761.245761][ T31] audit: type=1400 audit(6761.200:179465): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6761.251449][ T31] audit: type=1400 audit(6761.200:179466): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6761.251612][ T31] audit: type=1400 audit(6761.200:179467): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6761.371373][ T31] audit: type=1400 audit(6761.320:179468): avc: denied { create } for pid=14576 comm="syz.0.9607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6761.387922][ T31] audit: type=1400 audit(6761.340:179469): avc: denied { bind } for pid=14576 comm="syz.0.9607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6761.444395][ T31] audit: type=1400 audit(6761.400:179470): avc: denied { write } for pid=14576 comm="syz.0.9607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6766.258296][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 6766.259310][ T31] audit: type=1400 audit(6766.210:179522): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6766.261193][ T31] audit: type=1400 audit(6766.210:179523): avc: denied { open } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6766.262746][ T31] audit: type=1400 audit(6766.210:179524): avc: denied { ioctl } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6766.275771][ T31] audit: type=1400 audit(6766.230:179525): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6766.278933][ T31] audit: type=1400 audit(6766.230:179526): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6766.280544][ T31] audit: type=1400 audit(6766.230:179527): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6766.289574][ T31] audit: type=1400 audit(6766.240:179528): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6766.292778][ T31] audit: type=1400 audit(6766.240:179529): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6766.295245][ T31] audit: type=1400 audit(6766.250:179530): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6766.306505][ T31] audit: type=1400 audit(6766.260:179531): avc: denied { ioctl } for pid=14584 comm="syz.1.9610" path="socket:[111043]" dev="sockfs" ino=111043 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6766.342636][T14588] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14588 comm=syz.0.9611 [ 6772.108843][ T31] kauditd_printk_skb: 115 callbacks suppressed [ 6772.109143][ T31] audit: type=1400 audit(6772.060:179647): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6772.119400][ T31] audit: type=1400 audit(6772.070:179648): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6772.135462][ T31] audit: type=1400 audit(6772.070:179649): avc: denied { read write } for pid=13741 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6772.135858][ T31] audit: type=1400 audit(6772.080:179650): avc: denied { open } for pid=13741 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6772.136062][ T31] audit: type=1400 audit(6772.080:179651): avc: denied { ioctl } for pid=13741 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6772.164641][ T31] audit: type=1400 audit(6772.120:179652): avc: denied { recv } for pid=14618 comm="syz.1.9620" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6772.166340][ T31] audit: type=1400 audit(6772.120:179653): avc: denied { recv } for pid=14618 comm="syz.1.9620" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6772.169089][ T31] audit: type=1400 audit(6772.120:179654): avc: denied { recv } for pid=14618 comm="syz.1.9620" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6772.173725][ T31] audit: type=1400 audit(6772.120:179655): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6772.176156][ T31] audit: type=1400 audit(6772.130:179656): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6777.428881][ T31] kauditd_printk_skb: 138 callbacks suppressed [ 6777.429201][ T31] audit: type=1400 audit(6777.380:179795): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6777.435221][ T31] audit: type=1400 audit(6777.390:179796): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6777.476854][ T31] audit: type=1400 audit(6777.430:179797): avc: denied { recv } for pid=7447 comm="kworker/0:0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6777.479547][ T31] audit: type=1400 audit(6777.430:179798): avc: denied { recv } for pid=7447 comm="kworker/0:0" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6777.486331][ T31] audit: type=1400 audit(6777.430:179799): avc: denied { recv } for pid=7447 comm="kworker/0:0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6777.489888][ T31] audit: type=1400 audit(6777.440:179800): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6777.498779][ T31] audit: type=1400 audit(6777.450:179801): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6777.501719][ T31] audit: type=1400 audit(6777.450:179802): avc: denied { recv } for pid=3113 comm="sshd-session" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6777.507983][ T31] audit: type=1400 audit(6777.460:179803): avc: denied { read write } for pid=8970 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6777.510002][ T31] audit: type=1400 audit(6777.460:179804): avc: denied { open } for pid=8970 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6782.658150][ T31] kauditd_printk_skb: 213 callbacks suppressed [ 6782.658440][ T31] audit: type=1400 audit(6782.610:180018): avc: denied { create } for pid=14691 comm="syz.1.9643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6782.684964][ T31] audit: type=1400 audit(6782.640:180019): avc: denied { connect } for pid=14691 comm="syz.1.9643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6782.697103][ T31] audit: type=1400 audit(6782.650:180020): avc: denied { recv } for pid=3114 comm="syz-executor" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6782.710986][ T31] audit: type=1400 audit(6782.660:180021): avc: denied { recv } for pid=10880 comm="syz.0.8715" saddr=10.0.2.2 src=43148 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6782.713315][ T31] audit: type=1400 audit(6782.660:180022): avc: denied { read write } for pid=13741 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6782.713430][ T31] audit: type=1400 audit(6782.660:180023): avc: denied { open } for pid=13741 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6782.716507][ T31] audit: type=1400 audit(6782.670:180024): avc: denied { ioctl } for pid=13741 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6782.744514][ T31] audit: type=1400 audit(6782.700:180025): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6782.745383][ T31] audit: type=1400 audit(6782.700:180026): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41252 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6782.752019][ T31] audit: type=1400 audit(6782.700:180027): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6783.712199][T14711] ------------[ cut here ]------------ [ 6783.712589][T14711] WARNING: CPU: 1 PID: 14711 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 6783.713909][T14711] refcount_t: underflow; use-after-free. [ 6783.714162][T14711] Modules linked in: [ 6783.714654][T14711] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 6783.715087][T14711] CPU: 1 UID: 0 PID: 14711 Comm: kworker/1:0 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 6783.715328][T14711] Hardware name: ARM-Versatile Express [ 6783.715639][T14711] Workqueue: md_misc mddev_delayed_delete [ 6783.715894][T14711] Call trace: [ 6783.716017][T14711] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6783.716267][T14711] r7:00000000 r6:8281f77c r5:00000000 r4:82260dd4 [ 6783.716479][T14711] [<80201b08>] (show_stack) from [<8021fb7c>] (dump_stack_lvl+0x54/0x7c) [ 6783.717285][T14711] [<8021fb28>] (dump_stack_lvl) from [<8021fbbc>] (dump_stack+0x18/0x1c) [ 6783.718218][T14711] r5:00000000 r4:82a77d18 [ 6783.718309][T14711] [<8021fba4>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x360) [ 6783.718461][T14711] [<80202518>] (vpanic) from [<802028ac>] (trace_suspend_resume+0x0/0xd8) [ 6783.718593][T14711] r7:808bb0e8 [ 6783.718649][T14711] [<80202878>] (panic) from [<802548cc>] (get_taint+0x0/0x1c) [ 6783.719027][T14711] r3:8280c684 r2:00000001 r1:822478ac r0:8224f274 [ 6783.719196][T14711] [<80254858>] (check_panic_on_warn) from [<80254a30>] (__warn+0x80/0x188) [ 6783.719406][T14711] [<802549b0>] (__warn) from [<80254d20>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 6783.719608][T14711] r8:00000009 r7:822b97a0 r6:dfb79e54 r5:83aa9800 r4:00000000 [ 6783.719811][T14711] [<80254b3c>] (warn_slowpath_fmt) from [<808bb0e8>] (refcount_warn_saturate+0x13c/0x174) [ 6783.720128][T14711] r10:83368270 r9:83274825 r8:83aa9800 r7:ddde2d40 r6:83274800 r5:8600ba1c [ 6783.720383][T14711] r4:8600b850 [ 6783.720539][T14711] [<808bafac>] (refcount_warn_saturate) from [<81a116c8>] (kobject_put+0x158/0x1f4) [ 6783.720822][T14711] [<81a11570>] (kobject_put) from [<81169670>] (mddev_delayed_delete+0x14/0x18) [ 6783.721075][T14711] r7:ddde2d40 r6:83274800 r5:8600ba1c r4:85d7aa80 [ 6783.721237][T14711] [<8116965c>] (mddev_delayed_delete) from [<8027a32c>] (process_one_work+0x1b4/0x4f4) [ 6783.721498][T14711] [<8027a178>] (process_one_work) from [<8027af74>] (worker_thread+0x1fc/0x3d8) [ 6783.721730][T14711] r10:61c88647 r9:83aa9800 r8:85d7aaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 6783.721891][T14711] r4:85d7aa80 [ 6783.721983][T14711] [<8027ad78>] (worker_thread) from [<80281f5c>] (kthread+0x12c/0x280) [ 6783.722170][T14711] r10:00000000 r9:85d7aa80 r8:8027ad78 r7:e4749e60 r6:85d7a180 r5:83aa9800 [ 6783.722403][T14711] r4:00000001 [ 6783.722530][T14711] [<80281e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 6783.722744][T14711] Exception stack(0xdfb79fb0 to 0xdfb79ff8) [ 6783.723078][T14711] 9fa0: 00000000 00000000 00000000 00000000 [ 6783.723453][T14711] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 6783.723747][T14711] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 6783.723967][T14711] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281e30 [ 6783.724173][T14711] r4:85c7e2c0 [ 6783.725545][T14711] Rebooting in 86400 seconds.. VM DIAGNOSIS: 02:27:46 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000000 R03=81a446bd R04=df96dbf4 R05=00000005 R06=000001b2 R07=000003b3 R08=82adbcd0 R09=8078c950 R10=82adbcd4 R11=df96dc4c R12=df96dbc8 R13=df96dc58 R14=80291474 R15=8022ce58 PSR=60010013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000002 R02=eb80b030 R03=00000030 R04=83c1bc40 R05=dfb79bbc R06=829590b0 R07=00000001 R08=82826ee0 R09=00000000 R10=000076b1 R11=dfb79b58 R12=dfb79afc R13=dfb79b3c R14=81a44a78 R15=80a79604 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000